Encryption for Digital Content (eBook)
XIII, 209 Seiten
Springer US (Verlag)
978-1-4419-0044-9 (ISBN)
Cryptography is an area that traditionally focused on secure communication, authentication and integrity. In recent times though, there is a wealth of novel fine-tuned cryptographic techniques that sprung up as cryptographers focused on the specialised problems that arise in digital content distribution. These include fingerprinting codes, traitor tracing, broadcast encryption and others. This book is an introduction to this new generation of cryptographic mechanisms as well as an attempt to provide a cohesive presentation of these techniques.
Encryption for Digital Content details the subset cover framework (currently used in the AACS encryption of Blu-Ray disks), fingerprinting codes, traitor tracing schemes as well as related security models and attacks. It provides an extensive treatment of the complexity of the revocation problem for multi-receiver (subscriber) encryption mechanisms, as well as the complexity of the traceability problem. Pirate evolution type of attacks are covered in depth. This volume also illustrates the manner that attacks affect parameter selection, and how this impacts implementations. The authors gratefully acknowledge the support of the National Science Foundation under Grant No. 0447808.
Cryptography is an area that traditionally focused on secure communication, authentication and integrity. In recent times though, there is a wealth of novel fine-tuned cryptographic techniques that sprung up as cryptographers focused on the specialised problems that arise in digital content distribution. These include fingerprinting codes, traitor tracing, broadcast encryption and others. This book is an introduction to this new generation of cryptographic mechanisms as well as an attempt to provide a cohesive presentation of these techniques. Encryption for Digital Content details the subset cover framework (currently used in the AACS encryption of Blu-Ray disks), fingerprinting codes, traitor tracing schemes as well as related security models and attacks. It provides an extensive treatment of the complexity of the revocation problem for multi-receiver (subscriber) encryption mechanisms, as well as the complexity of the traceability problem. Pirate evolution type of attacks are covered in depth. This volume also illustrates the manner that attacks affect parameter selection, and how this impacts implementations. The authors gratefully acknowledge the support of the National Science Foundation under Grant No. 0447808.
Preface 6
Contents 9
List of Figures 11
1 Fingerprinting Codes 14
Preliminaries 15
Definition of Fingerprinting Codes 16
Applications to Digital Content Distribution 18
Constructions 20
Combinatorial Constructions 20
The Chor-Fiat-Naor Fingerprinting Codes 27
The Boneh-Shaw Fingerprinting Codes 31
The Tardos Fingerprinting Codes 34
Code Concatenation 42
Bibliographic Notes 45
2 Broadcast Encryption 47
Definition of Broadcast Encryption 48
Broadcast Encryption Based on Exclusive-Set Systems 52
Security 56
The Subset Cover Framework 61
The Key-Poset Framework for Broadcast Encryption 62
Viewing Set Systems as Partial Orders 62
Computational Specification of Set Systems 67
Compression of Key Material 68
Revocation in the Key-Poset Framework 72
Revocation in the key-poset framework: Definitions 73
A sufficient condition for optimal revocation 76
Constructions 81
Complete Subtree 81
Subset Difference 86
Key Chain Tree 93
Generic Transformations for Key Posets 100
Layering Set Systems 101
X-Transformation 104
Bibliographic notes 113
3 Traitor Tracing 118
Multiuser Encryption Schemes 118
Constructions For Multiuser Encryption Schemes 120
Linear Length Multiuser Encryption Scheme 120
Multiuser Encryption Schemes Based on Fingerprinting Codes 123
Boneh-Franklin Multiuser Encryption Scheme 130
Tracing Game: Definitions 134
Types of Tracing Games 137
Non-Black Box Tracing Game. 137
Black-Box Tracing Game. 138
Traceability of Multiuser Encryption Schemes 141
Traceability of Linear Length Multiuser Encryption Scheme 141
Traceability of Schemes Based on Fingerprinting Codes 145
Traceability of the Boneh-Franklin Scheme 153
Bibliographic Notes 156
4 Trace and Revoke Schemes 161
Revocation Game: Definitions 162
Tracing and Revoking in the Subset Cover Framework 167
Tracing and Revoking Pirate Rebroadcasts 171
On the effectiveness of Trace and Revoke schemes 176
Bibliographic Notes 177
5 Pirate Evolution 180
Pirate Evolution: Definitions 181
A Trace and Revoke Scheme Immune to Pirate-Evolution 183
Pirate Evolution for the Complete Subtree Method 185
Pirate Evolution for the Subset Difference Method 191
Bibliographic Notes 205
References 207
Index 215
Erscheint lt. Verlag | 27.10.2010 |
---|---|
Reihe/Serie | Advances in Information Security | Advances in Information Security |
Zusatzinfo | XIII, 209 p. |
Verlagsort | New York |
Sprache | englisch |
Themenwelt | Mathematik / Informatik ► Informatik ► Datenbanken |
Informatik ► Netzwerke ► Sicherheit / Firewall | |
Informatik ► Theorie / Studium ► Kryptologie | |
Naturwissenschaften | |
Schlagworte | AAC • authentication • broadcast • Communication • Complexity • Content • CRIB • cryptography • currentjm • data structures • digital • Distribution • Encryption • Fingerprinting • mechanisms • security |
ISBN-10 | 1-4419-0044-6 / 1441900446 |
ISBN-13 | 978-1-4419-0044-9 / 9781441900449 |
Haben Sie eine Frage zum Produkt? |
Größe: 4,4 MB
DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasserzeichen und ist damit für Sie personalisiert. Bei einer missbräuchlichen Weitergabe des eBooks an Dritte ist eine Rückverfolgung an die Quelle möglich.
Dateiformat: PDF (Portable Document Format)
Mit einem festen Seitenlayout eignet sich die PDF besonders für Fachbücher mit Spalten, Tabellen und Abbildungen. Eine PDF kann auf fast allen Geräten angezeigt werden, ist aber für kleine Displays (Smartphone, eReader) nur eingeschränkt geeignet.
Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.
Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.
Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.
aus dem Bereich