Piracy protection in content distribution systems

作者: Dongvu Tonien , None

DOI:

关键词: Traitor tracingGeneralizationOpen problemLogarithmCombinatoricsPerfect hash functionHash functionCode (cryptography)MathematicsPublic-key cryptographyDiscrete mathematics

摘要: In this thesis, we consider the traitor tracing problem. We study codes with different traceability properties and public key schemes. maximal 2-identifiable parent property. Using graph theoretic techniques, determine structure of representation length three having property, derive number codewords in such codes. Maximal property four have recently been studied. It is still an open problem to size a code greater than four. present direct construction 2-secure frameproof logarithmic length. This only known All other constructions short use recursive techniques. introduce new combinatorial object called difference function families which generalization matrices. families, that can apply small obtain larger same security Our techniques generalize some give better results. The most important advantage our technique it be applied all secure hash families. That is, codes, IPP TA separating perfect No linear attack on first scheme uses bilinear pairing. schemes decryption keys satisfy equation. show these must depend collusion threshold order resist attack. lower

参考文章(70)
Reihaneh Safavi-Naini, Yejing Wang, Collusion secure q-ary fingerprinting for perceptual content Lecture Notes in Computer Science. pp. 57- 75 ,(2002)
Matthias Schunter, Birgit Pfitzmann, Asymmetric Fingerprinting (Extended Abstract) theory and application of cryptographic techniques. pp. 84- 95 ,(1996)
Jeff Jianxin Yan, Yongdong Wu, An attack on a traitor tracing scheme IACR Cryptology ePrint Archive. ,vol. 2001, pp. 67- ,(2001)
Kyu Young Choi, Jung Yeon Hwang, Dong Hoon Lee, Efficient ID-based Group Key Agreement with Bilinear Maps public key cryptography. pp. 130- 144 ,(2004) , 10.1007/978-3-540-24632-9_10
Chong Hee Kim, Yong Ho Hwang, Pil Joong Lee, TTS without Revocation Capability Secure Against CCA2 australasian conference on information security and privacy. pp. 36- 49 ,(2004) , 10.1007/978-3-540-27800-9_4
Aggelos Kiayias, Moti Yung, Self Protecting Pirates and Black-Box Traitor Tracing international cryptology conference. pp. 63- 79 ,(2001) , 10.1007/3-540-44647-8_4
Wen-Guey Tzeng, Zhi-Jia Tzeng, A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares public key cryptography. ,vol. 1992, pp. 207- 224 ,(2001) , 10.1007/3-540-44586-2_16
Tomoyuki Asano, A Revocation Scheme with Minimal Storage at Receivers international conference on the theory and application of cryptology and information security. pp. 433- 450 ,(2002) , 10.1007/3-540-36178-2_27
Sylvia Encheva, Gérard Cohen, Partially Identifying Codes for Copyright Protection Applicable Algebra in Engineering, Communication and Computing. pp. 260- 267 ,(2001) , 10.1007/3-540-45624-4_27
Reihaneh Safavi-Naini, Yejing Wang, Sequential Traitor Tracing international cryptology conference. pp. 316- 332 ,(2000) , 10.1007/3-540-44598-6_20