Defending against the pirate evolution attack

Hongxia Jin, J. Lotspiech, Serdar Pehlivanoglu
{"title":"Defending against the pirate evolution attack","authors":"Hongxia Jin, J. Lotspiech, Serdar Pehlivanoglu","doi":"10.1504/IJACT.2010.033796","DOIUrl":null,"url":null,"abstract":"A trace and revoke scheme is an encryption scheme for secure content distribution so that only authorized users can access the copyrighted content. When a clone device is recovered, the \"trace\" component detects the pirate users that have compromised the secret keys in their devices and participated in the construction of the clone device. The \"revoke\" component excludes the pirate users from accessing the future content. The state-of-art trace-revoke scheme is the very efficient subset difference based NNL scheme [11] which is also deployed in AACS [1], the industry new content protection standard for high definition DVDs. While its revocation and tracing are both very efficient, as pointed out by Kiayias and Pehlivanoglu from Crypto 2007, in its deployment NNL scheme may suffer from a new attack called pirate evolution attack . In this attack attackers reveal the compromised secret keys to the clone decoder very slowly through a number of generations of pirate decoders that will take long time to disable them all. They showed in a system with N users, the attacker can produce up to t *logN generations of pirate decoders given t sets of keys. In AACS context, that means a pirate can produce more than 300 generations of decoders by compromising only 10 devices. If this happens, it will indeed be a nightmare. \n \nIn this paper we are interested in practical solutions that can defend well against the pirate evolution attack in practice. In particular we devise an easy and efficient approach for the subset difference based NNL scheme [11] to defend well against the potential pirate evolution attack. Indeed it takes as small as 2 generations to detect and disable a traitor in a coalition. This can be achieved by only negligibly increasing the cipher text header size in an application like AACS. The simplicity, efficiency and practicality of our approach has made AACS to adopt it to defend against the pirate evolution attack.","PeriodicalId":53552,"journal":{"name":"International Journal of Applied Cryptography","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2009-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Applied Cryptography","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1504/IJACT.2010.033796","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"Mathematics","Score":null,"Total":0}
引用次数: 5

Abstract

A trace and revoke scheme is an encryption scheme for secure content distribution so that only authorized users can access the copyrighted content. When a clone device is recovered, the "trace" component detects the pirate users that have compromised the secret keys in their devices and participated in the construction of the clone device. The "revoke" component excludes the pirate users from accessing the future content. The state-of-art trace-revoke scheme is the very efficient subset difference based NNL scheme [11] which is also deployed in AACS [1], the industry new content protection standard for high definition DVDs. While its revocation and tracing are both very efficient, as pointed out by Kiayias and Pehlivanoglu from Crypto 2007, in its deployment NNL scheme may suffer from a new attack called pirate evolution attack . In this attack attackers reveal the compromised secret keys to the clone decoder very slowly through a number of generations of pirate decoders that will take long time to disable them all. They showed in a system with N users, the attacker can produce up to t *logN generations of pirate decoders given t sets of keys. In AACS context, that means a pirate can produce more than 300 generations of decoders by compromising only 10 devices. If this happens, it will indeed be a nightmare. In this paper we are interested in practical solutions that can defend well against the pirate evolution attack in practice. In particular we devise an easy and efficient approach for the subset difference based NNL scheme [11] to defend well against the potential pirate evolution attack. Indeed it takes as small as 2 generations to detect and disable a traitor in a coalition. This can be achieved by only negligibly increasing the cipher text header size in an application like AACS. The simplicity, efficiency and practicality of our approach has made AACS to adopt it to defend against the pirate evolution attack.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
防御海盗进化攻击
跟踪和撤销方案是一种用于安全内容分发的加密方案,以便只有授权用户才能访问受版权保护的内容。当克隆设备被恢复时,“跟踪”组件会检测到已经泄露了其设备中的密钥并参与克隆设备构建的盗版用户。“revoke”组件将禁止盗版用户访问未来的内容。最先进的追溯撤销方案是非常高效的基于子集差异的NNL方案[11],该方案也部署在AACS[1]中,AACS[1]是业界最新的高清dvd内容保护标准。正如Kiayias和Pehlivanoglu在Crypto 2007中指出的那样,虽然它的撤销和跟踪都非常有效,但在部署NNL方案时可能会遭受一种称为海盗进化攻击的新攻击。在这种攻击中,攻击者通过几代海盗解码器非常缓慢地揭示了克隆解码器的受损密钥,这将需要很长时间才能禁用它们。他们表明,在一个有N个用户的系统中,攻击者可以在给定t组密钥的情况下产生多达t *logN代的盗版解码器。在AACS环境下,这意味着一个盗版者可以通过入侵10台设备来生产300多代解码器。如果发生这种情况,那将是一场噩梦。在本文中,我们感兴趣的是在实践中能够很好地防御海盗进化攻击的实用解决方案。特别是,我们设计了一种简单有效的基于子集差分的NNL方案[11],可以很好地防御潜在的海盗进化攻击。事实上,只需两代人就能发现并消灭联盟中的叛徒。这可以通过在像AACS这样的应用程序中微不足道地增加密文报头大小来实现。该方法的简单、高效和实用性使得AACS采用它来防御海盗进化攻击。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
International Journal of Applied Cryptography
International Journal of Applied Cryptography Mathematics-Applied Mathematics
CiteScore
2.00
自引率
0.00%
发文量
0
期刊最新文献
Image and object encryption using multiplicative cipher and K-means clustering algorithm Efficient revocable identity-based encryption with equality test Hashing into Hessian curves A framework for universally composable non-committing blind signatures Fair threshold decryption with semi-trusted third parties
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1