Nicht aus der Schweiz? Besuchen Sie lehmanns.de

Encryption for Digital Content (eBook)

eBook Download: PDF
2010 | 2010
XIII, 209 Seiten
Springer US (Verlag)
978-1-4419-0044-9 (ISBN)

Lese- und Medienproben

Encryption for Digital Content -  Aggelos Kiayias,  Serdar Pehlivanoglu
Systemvoraussetzungen
96,29 inkl. MwSt
(CHF 93,95)
Der eBook-Verkauf erfolgt durch die Lehmanns Media GmbH (Berlin) zum Preis in Euro inkl. MwSt.
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

Cryptography is an area that traditionally focused on secure communication, authentication and integrity. In recent times though, there is a wealth of novel  fine-tuned cryptographic techniques that sprung up as cryptographers focused on the specialised problems that arise in digital content distribution. These include fingerprinting codes, traitor tracing, broadcast encryption and others. This book is an introduction to this new generation of cryptographic mechanisms as well as an attempt to provide a cohesive presentation of these techniques.

Encryption for Digital Content details the subset cover framework (currently used in the AACS encryption of Blu-Ray disks), fingerprinting codes, traitor tracing schemes as well as related security models and attacks.   It provides an extensive treatment of the complexity of the revocation problem for multi-receiver (subscriber) encryption mechanisms, as well as the complexity of the traceability problem. Pirate evolution type of attacks are covered in depth. This volume also illustrates the manner that attacks affect parameter selection, and how this impacts implementations. The authors gratefully acknowledge the support of the National Science Foundation under Grant No. 0447808.


Cryptography is an area that traditionally focused on secure communication, authentication and integrity. In recent times though, there is a wealth of novel fine-tuned cryptographic techniques that sprung up as cryptographers focused on the specialised problems that arise in digital content distribution. These include fingerprinting codes, traitor tracing, broadcast encryption and others. This book is an introduction to this new generation of cryptographic mechanisms as well as an attempt to provide a cohesive presentation of these techniques. Encryption for Digital Content details the subset cover framework (currently used in the AACS encryption of Blu-Ray disks), fingerprinting codes, traitor tracing schemes as well as related security models and attacks. It provides an extensive treatment of the complexity of the revocation problem for multi-receiver (subscriber) encryption mechanisms, as well as the complexity of the traceability problem. Pirate evolution type of attacks are covered in depth. This volume also illustrates the manner that attacks affect parameter selection, and how this impacts implementations. The authors gratefully acknowledge the support of the National Science Foundation under Grant No. 0447808.

Preface 6
Contents 9
List of Figures 11
1 Fingerprinting Codes 14
Preliminaries 15
Definition of Fingerprinting Codes 16
Applications to Digital Content Distribution 18
Constructions 20
Combinatorial Constructions 20
The Chor-Fiat-Naor Fingerprinting Codes 27
The Boneh-Shaw Fingerprinting Codes 31
The Tardos Fingerprinting Codes 34
Code Concatenation 42
Bibliographic Notes 45
2 Broadcast Encryption 47
Definition of Broadcast Encryption 48
Broadcast Encryption Based on Exclusive-Set Systems 52
Security 56
The Subset Cover Framework 61
The Key-Poset Framework for Broadcast Encryption 62
Viewing Set Systems as Partial Orders 62
Computational Specification of Set Systems 67
Compression of Key Material 68
Revocation in the Key-Poset Framework 72
Revocation in the key-poset framework: Definitions 73
A sufficient condition for optimal revocation 76
Constructions 81
Complete Subtree 81
Subset Difference 86
Key Chain Tree 93
Generic Transformations for Key Posets 100
Layering Set Systems 101
X-Transformation 104
Bibliographic notes 113
3 Traitor Tracing 118
Multiuser Encryption Schemes 118
Constructions For Multiuser Encryption Schemes 120
Linear Length Multiuser Encryption Scheme 120
Multiuser Encryption Schemes Based on Fingerprinting Codes 123
Boneh-Franklin Multiuser Encryption Scheme 130
Tracing Game: Definitions 134
Types of Tracing Games 137
Non-Black Box Tracing Game. 137
Black-Box Tracing Game. 138
Traceability of Multiuser Encryption Schemes 141
Traceability of Linear Length Multiuser Encryption Scheme 141
Traceability of Schemes Based on Fingerprinting Codes 145
Traceability of the Boneh-Franklin Scheme 153
Bibliographic Notes 156
4 Trace and Revoke Schemes 161
Revocation Game: Definitions 162
Tracing and Revoking in the Subset Cover Framework 167
Tracing and Revoking Pirate Rebroadcasts 171
On the effectiveness of Trace and Revoke schemes 176
Bibliographic Notes 177
5 Pirate Evolution 180
Pirate Evolution: Definitions 181
A Trace and Revoke Scheme Immune to Pirate-Evolution 183
Pirate Evolution for the Complete Subtree Method 185
Pirate Evolution for the Subset Difference Method 191
Bibliographic Notes 205
References 207
Index 215

Erscheint lt. Verlag 27.10.2010
Reihe/Serie Advances in Information Security
Zusatzinfo XIII, 209 p.
Verlagsort New York
Sprache englisch
Themenwelt Mathematik / Informatik Informatik Datenbanken
Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Kryptologie
Naturwissenschaften
Schlagworte AAC • authentication • broadcast • Communication • Complexity • Content • CRIB • cryptography • currentjm • data structures • digital • Distribution • Encryption • Fingerprinting • mechanisms • security
ISBN-10 1-4419-0044-6 / 1441900446
ISBN-13 978-1-4419-0044-9 / 9781441900449
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 4,4 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Das umfassende Handbuch

von Michael Kofler; Klaus Gebeshuber; Peter Kloep …

eBook Download (2022)
Rheinwerk Computing (Verlag)
CHF 48,75
Umfassendes Sicherheits-, Kontinuitäts- und Risikomanagement mit …

von Klaus-Rainer Müller

eBook Download (2023)
Springer Vieweg (Verlag)
CHF 78,15