Protecting Cryptographic Keys: The Trace-and-Revoke Approach

نویسندگان

  • Dalit Naor
  • Moni Naor
چکیده

D igital content is easy to generate, transfer, and reproduce. Although this makes the technology attractive and has brought about its proliferation, it has also become a major source of ownership-information violations with respect to either copyright or the privacy of individuals and businesses. With the increasing amount of readily available digital content and the resulting constant reduction in storage media prices, we can expect the phenomenon of ownership violation to increase steadily. Ownership protection presents a fundamental social issue: Society must define its usage rules and accompany those rules with appropriate means to enforce them via, for example, legislation. However, technological developments can certainly help shape the ground rules by raising technical and social barriers against the violators. What ownership protection can technology offer these days? The state-of-the-art methods that can help to limit copyright and intellectual-property ownership violations fall into three categories:

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Generic Construction of Trace and Revoke Schemes

Broadcast encryption (BE) is a cryptographic primitive that allows a broadcaster to encrypt digital content to a privileged set of users and in this way prevent revoked users from accessing the content. In BE schemes, a group of users, called traitors may leak their keys and enable an adversary to receive the content. Such malicious users can be detected through traitor tracing (TT) schemes. Th...

متن کامل

Pirate Evolution: How to Make the Most of Your Traitor Keys

We introduce a novel attack concept against trace and revoke schemes called pirate evolution. In this setting, the attacker, called an evolving pirate, is handed a number of traitor keys and produces a number of generations of pirate decoders that are successively disabled by the trace and revoke system. A trace and revoke scheme is susceptible to pirate evolution when the number of decoders th...

متن کامل

Generic Trace and Revoke Scheme ∗

Broadcast encryption (BE) is a cryptographic primitive that allows a broadcaster to encrypt a content to a specific group of users called privileged users and prevent revoked users from decrypting the content even if they collude [6]. In BE schemes, a group of users, called traitors may collude and form a pirate decoder. In order to trace such actions, Traitor tracing (TT) schemes are proposed ...

متن کامل

Efficient Public Trace and Revoke from Standard Assumptions

We provide e cient constructions for trace-and-revoke systems with public traceability in the black-box con rmation model. Our constructions achieve adaptive security, are based on standard assumptions and achieve signi cant e ciency gains compared to previous constructions. Our constructions rely on a generic transformation from inner product functional encryption (IPFE) schemes to trace-and-r...

متن کامل

Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack

A (public key) Trace and Revoke Scheme combines the functionality of broadcast encryption with the capability of traitor tracing. Specifically, (1) a trusted center publishes a single public key and distributes individual secret keys to the users of the system; (2) anybody can encrypt a message so that all but a specified subset of “revoked” users can decrypt the resulting ciphertext; and (3) i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IEEE Computer

دوره 36  شماره 

صفحات  -

تاریخ انتشار 2003