{"id":"https://openalex.org/W1984284342","doi":"https://doi.org/10.1145/1982185.1982513","title":"Efficient traitor tracing for clone attack in content protection","display_name":"Efficient traitor tracing for clone attack in content protection","publication_year":2011,"publication_date":"2011-03-21","ids":{"openalex":"https://openalex.org/W1984284342","doi":"https://doi.org/10.1145/1982185.1982513","mag":"1984284342"},"language":"en","primary_location":{"id":"doi:10.1145/1982185.1982513","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1982185.1982513","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2011 ACM Symposium on Applied Computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5044205212","display_name":"Hongxia Jin","orcid":"https://orcid.org/0009-0000-0222-4217"},"institutions":[{"id":"https://openalex.org/I4210085935","display_name":"IBM Research - Almaden","ror":"https://ror.org/005w8dd04","country_code":"US","type":"facility","lineage":["https://openalex.org/I1341412227","https://openalex.org/I4210085935","https://openalex.org/I4210114115"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Hongxia Jin","raw_affiliation_strings":["IBM Research Center Almaden, San Jose, CA"],"affiliations":[{"raw_affiliation_string":"IBM Research Center Almaden, San Jose, CA","institution_ids":["https://openalex.org/I4210085935"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5113999085","display_name":"Jeffrey Lotspiech","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jeffrey Lotspiech","raw_affiliation_strings":["Lotspiech.com, Henderson, NV"],"affiliations":[{"raw_affiliation_string":"Lotspiech.com, Henderson, NV","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5044205212"],"corresponding_institution_ids":["https://openalex.org/I4210085935"],"apc_list":null,"apc_paid":null,"fwci":0.5151,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.66512882,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1544","last_page":"1549"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13999","display_name":"Digital Rights Management and Security","score":0.9923999905586243,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/traitor-tracing","display_name":"Traitor tracing","score":0.9473069310188293},{"id":"https://openalex.org/keywords/clone","display_name":"clone (Java method)","score":0.7777068614959717},{"id":"https://openalex.org/keywords/tracing","display_name":"Tracing","score":0.7364652156829834},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.72071373462677},{"id":"https://openalex.org/keywords/traceability","display_name":"Traceability","score":0.7055447101593018},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5535592436790466},{"id":"https://openalex.org/keywords/cipher","display_name":"Cipher","score":0.5438999533653259},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4628758728504181},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4280148446559906},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.37939614057540894},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.2095893919467926},{"id":"https://openalex.org/keywords/biology","display_name":"Biology","score":0.05995979905128479}],"concepts":[{"id":"https://openalex.org/C2781411299","wikidata":"https://www.wikidata.org/wiki/Q7833043","display_name":"Traitor tracing","level":4,"score":0.9473069310188293},{"id":"https://openalex.org/C81089528","wikidata":"https://www.wikidata.org/wiki/Q5134986","display_name":"clone (Java method)","level":3,"score":0.7777068614959717},{"id":"https://openalex.org/C138673069","wikidata":"https://www.wikidata.org/wiki/Q322229","display_name":"Tracing","level":2,"score":0.7364652156829834},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.72071373462677},{"id":"https://openalex.org/C153876917","wikidata":"https://www.wikidata.org/wiki/Q899704","display_name":"Traceability","level":2,"score":0.7055447101593018},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5535592436790466},{"id":"https://openalex.org/C2780221543","wikidata":"https://www.wikidata.org/wiki/Q4681865","display_name":"Cipher","level":3,"score":0.5438999533653259},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4628758728504181},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4280148446559906},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.37939614057540894},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2095893919467926},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.05995979905128479},{"id":"https://openalex.org/C54355233","wikidata":"https://www.wikidata.org/wiki/Q7162","display_name":"Genetics","level":1,"score":0.0},{"id":"https://openalex.org/C552990157","wikidata":"https://www.wikidata.org/wiki/Q7430","display_name":"DNA","level":2,"score":0.0},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1982185.1982513","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1982185.1982513","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2011 ACM Symposium on Applied Computing","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W1481965140","https://openalex.org/W1500101059","https://openalex.org/W1541829396","https://openalex.org/W1596144702","https://openalex.org/W1973114896","https://openalex.org/W2018225254","https://openalex.org/W2109661373","https://openalex.org/W2123605029","https://openalex.org/W2165902826","https://openalex.org/W2168571148","https://openalex.org/W2561675875","https://openalex.org/W6635708402","https://openalex.org/W6721411451"],"related_works":["https://openalex.org/W1561762905","https://openalex.org/W2613516814","https://openalex.org/W2989083936","https://openalex.org/W2109661373","https://openalex.org/W1510640641","https://openalex.org/W2140065445","https://openalex.org/W3196755287","https://openalex.org/W2555433399","https://openalex.org/W2366712519","https://openalex.org/W2351957531"],"abstract_inverted_index":{"In":[0,20,34,117,208],"this":[1,21,209],"paper":[2],"we":[3,211],"design":[4,222],"efficient":[5,197],"traitor":[6,88,178,219,249],"tracing":[7,89,121,160,179,204,220,250,273],"scheme":[8,90,161,221,251],"for":[9,79,113,191,259,283,309],"a":[10,15,29,35,54,82,87,123,159,213,230,284],"pirate":[11],"clone":[12,36,55,58,77,83,134,141,260,285],"attack":[13,261,286],"against":[14],"broadcast-encryption-based":[16],"content":[17,22,63,115,306],"protection":[18,23,307],"system.":[19],"system,":[24],"each":[25],"user(device)":[26],"is":[27,65,85,130,143,162,262],"assigned":[28],"set":[30],"of":[31,62,120,125,139,158,167,287],"secret":[32,46],"keys.":[33],"attack,":[37],"pirates":[38,73],"(legitimate":[39],"users)":[40],"compromise":[41],"their":[42,45],"devices,":[43],"extract":[44],"keys":[47,51,98,106,150],"and":[48,136,145],"use":[49,299],"those":[50],"to":[52,147,172,202,242,268,280,298],"build":[53],"device.":[56],"The":[57,72,156,176,257],"device":[59,78,84,135,142],"allows":[60],"decryption":[61],"that":[64,216],"originally":[66],"only":[67],"accessible":[68],"by":[69,164,228],"legitimate":[70],"devices.":[71],"can":[74,110],"sell":[75],"the":[76,101,104,118,133,137,140,154,165,174,182,195,247,272,276,303],"profits.":[80],"When":[81],"recovered,":[86],"could":[91,200],"identify":[92,173],"which":[93,149,270],"compromised":[94,105],"devices'":[95],"(called":[96],"traitors)":[97],"are":[99,107,151],"in":[100,181,206,253,300],"clone.":[102,155],"Once":[103],"detected,":[108],"they":[109],"be":[111],"disabled":[112],"future":[114],"access.":[116],"process":[119],"traitors,":[122],"series":[124],"carefully":[126],"constructed":[127],"cipher":[128,169],"text":[129],"fed":[131],"into":[132],"reaction":[138],"observed":[144],"used":[146],"deduce":[148],"contained":[152],"inside":[153],"traceability":[157,199,245],"measured":[163],"number":[166],"testing":[168],"texts":[170],"needed":[171],"traitors.":[175,193,289],"state-of-art":[177,248],"schemes":[180],"symmetric":[183],"key":[184,232],"setting":[185],"achieve":[186],"O(t3":[187,265],"log":[188,266],"t)":[189,267],"traceabilities":[190,258,293],"t":[192],"Unfortunately":[194],"theoretically":[196],"polynomial":[198],"convert":[201],"years'":[203],"time":[205,274],"reality.":[207],"paper,":[210],"present":[212],"practical":[214],"approach":[215,241],"combines":[217],"traditional":[218],"with":[223],"system":[224],"security":[225],"engineering":[226],"consideration":[227],"introducing":[229],"\"software":[231],"conversion":[233],"data\"":[234],"virtual":[235],"program.":[236],"This":[237],"combination":[238],"enables":[239],"our":[240],"drastically":[243],"improve":[244],"over":[246],"existed":[252],"applied":[254],"cryptography":[255],"community.":[256],"improved":[263,292],"from":[264,275],"O(t)":[269],"converts":[271],"original":[277],"15":[278],"years":[279],"4":[281],"hours":[282],"100":[288],"Our":[290],"much":[291],"makes":[294],"them":[295],"ultimately":[296],"adopted":[297],"AACS":[301],"[1],":[302],"new":[304],"industry":[305],"standard":[308],"next":[310],"generation":[311],"high":[312],"definition":[313],"DVDs.":[314]},"counts_by_year":[{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
