Unifying Broadcast Encryption and Traitor Tracing for Content Protection

Honolulu, HI(2009)

引用 6|浏览2
暂无评分
摘要
In this paper we study the design of efficient trace-revoke schemes for content protection. In state-of-art, broadcast encryption and traitor tracing are viewed as two orthogonal problems. Good traceability and efficient revocation seem to demand different types of design. When combined into trace-revoke schemes, existing schemes only offer efficiency on one aspect but weak on the other. Moreover, there are two major styles of pirate attacks, namely the clone device attack and anonymous re-broadcasting attack. In current state-of-art, defending against these two attacks are viewed as two different problems that demand different trace-revoke schemes. In current state-of-practice, a content protection system has to deploy two trace-revoke schemes in order to provide complete protections against both attacks. As a result, the system incurs the complexity of having to manage two schemes, even worse the overall strength of the system is the weakest link in either scheme. In this paper we present a unified trace-revoke system that can offer superior efficiency on both traceability and revocation capability as well as simultaneously defend against two attacks in a unified way. Our unified system offers everything that the original two schemes combined can provide, but our system is much simpler and more efficient. The design of our unified framework carries both scientific and real world practical significance. We reduce the tracing time from tens of years to hours. The much improved simplicity and efficiency of our unified system caused it to be adopted by the new version of AACS, advanced access content system, the industry content protection standard for the new Blu-ray high-definition-video optical discs. Scientifically our design shows it is possible to design an efficient broadcast encryption scheme and traitor tracing scheme in a unified way. We also showed the equivalence of the two major types of attacks which are currently viewed as different attacks. This opens - brand new directions for future research on broadcast encryption and traitor tracing.
更多
查看译文
关键词
broadcast encryption,high definition video,anti-piracy,traitor tracing,different attack,efficient trace-revoke scheme,cryptography,pirate attacks,content protection system,different trace-revoke scheme,broadcasting,content protection,blu-ray high-definition-video optical discs,unified framework,advanced access content system,blu-ray,anonymous re-broadcasting attack,unified trace-revoke system,clone device attack,industry content protection standard,different problem,trace-revoke scheme,unified system,dvds,unifying broadcast encryption,computer security,motion pictures,cloning,forensics,media,artificial neural networks
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要