首页 > 最新文献

ACM Digital Rights Management Workshop最新文献

英文 中文
A domain specific language for usage management 用于使用管理的领域特定语言
Pub Date : 2011-10-21 DOI: 10.1145/2046631.2046641
Christopher C. Lamb, Pramod A. Jamkhedkar, Mathew P. Bohnsack, Viswanath Nandina, G. Heileman
In this paper we describe the development of a domain specific language (DSL) for expressing usage management policies and associating those policies with managed artifacts. We begin by framing a model for the language, including generalized use cases, a domain model, a general supported life-cycle, and specific extension requirements. We then develop the language from that model, demonstrating key syntactic elements and highlighting the technology behind the language while tracing features back to the initial model. We then demonstrate how the DSL supports common usage management and DRM-centric environments, including creative commons, the extensible rights markup language (XrML), and the open digital rights language (ODRL).
在本文中,我们描述了一种领域特定语言(DSL)的开发,该语言用于表达使用管理策略并将这些策略与托管工件相关联。我们首先为语言构建一个模型,包括一般化的用例、领域模型、一般支持的生命周期和特定的扩展需求。然后,我们从该模型开发语言,演示关键的语法元素并突出语言背后的技术,同时将功能追溯到初始模型。然后,我们将演示DSL如何支持公共使用管理和以drm为中心的环境,包括creative commons、可扩展权限标记语言(XrML)和开放数字权限语言(ODRL)。
{"title":"A domain specific language for usage management","authors":"Christopher C. Lamb, Pramod A. Jamkhedkar, Mathew P. Bohnsack, Viswanath Nandina, G. Heileman","doi":"10.1145/2046631.2046641","DOIUrl":"https://doi.org/10.1145/2046631.2046641","url":null,"abstract":"In this paper we describe the development of a domain specific language (DSL) for expressing usage management policies and associating those policies with managed artifacts. We begin by framing a model for the language, including generalized use cases, a domain model, a general supported life-cycle, and specific extension requirements. We then develop the language from that model, demonstrating key syntactic elements and highlighting the technology behind the language while tracing features back to the initial model. We then demonstrate how the DSL supports common usage management and DRM-centric environments, including creative commons, the extensible rights markup language (XrML), and the open digital rights language (ODRL).","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122803471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Is DRM working?: how could we tell? DRM有效吗?我们怎么知道呢?
Pub Date : 2011-10-21 DOI: 10.1145/2046631.2046633
Bruce E. Boyden
The success or failure of digital rights management is often taken in legal circles to be a technological question: has a particular scheme already been cracked? How broadly is protected content being redistributed? Can any scheme provide absolute security for content? By these measures, DRM, at least in its most visible applications, has been a failure, as has its legal bulwark, the Digital Millennium Copyright Act. Most widely available schemes are cracked within a few years of release. And due to the nature of the Internet, breaking a scheme once means it is broken everywhere. Under these conditions, absolute security is both required and impossible. This is the so-called "Darknet" hypothesis, first described at the ACM-DRM workshop nine years ago. But the success or failure of DRM and anticircumvention policy generally is also a legal question, or more properly, a question about how law and technology interact with society. Assessing DRM's success therefore requires first determining its place in a copyright landscape that is undergoing a fundamental transformation. That transformation can be described simply as a disappearance of gates. Copyright relies on a world that makes copying without permission costly and difficult. That is, it relies on natural choke points at which access to content can be traded for money. Those natural choke points, or "gates," are disappearing. DRM is an attempt to reestablish a sort of gate, and its success or failure in any given application depends on how well it mimics the real-world gates it is replacing. And that is primarily a social question, not a technological one. Furthermore, it indicates a different set of threats to DRM schemes, and to the policy embodied in the DMCA: to the extent such schemes visibly interfere with common uses, their viability as replacement gates is diminished. The gravest threat to DRM schemes may come not from a particular sophisticated attack, but rather from a dissipation of the illusion of naturalness.
在法律界,数字版权管理的成败通常被视为一个技术问题:某个特定的方案是否已经被破解?受保护的内容被重新分发的范围有多广?任何方案都可以为内容提供绝对的安全性吗?通过这些措施,DRM,至少在其最明显的应用中,是失败的,就像它的法律堡垒——数字千年版权法案一样。大多数广泛使用的方案在发布后几年内就被破解了。由于互联网的性质,一旦打破一个计划就意味着它无处不在。在这种情况下,绝对安全是必要的,也是不可能的。这就是所谓的“暗网”假说,九年前在ACM-DRM研讨会上首次提出。但DRM和反盗版政策的成败通常也是一个法律问题,或者更恰当地说,是一个法律和技术如何与社会相互作用的问题。因此,评估DRM的成功首先需要确定它在正在经历根本性变革的版权格局中的位置。这种转变可以简单地描述为门的消失。版权依赖于一个让未经许可的复制变得昂贵和困难的世界。也就是说,它依赖于自然的瓶颈,在这个瓶颈上,对内容的访问可以进行交易。那些自然的瓶颈或“大门”正在消失。DRM是一种重新建立某种门的尝试,它在任何给定应用程序中的成功或失败取决于它对要替换的现实世界门的模仿程度。这主要是一个社会问题,而不是一个技术问题。此外,它还表明了对DRM方案和DMCA所体现的政策的一组不同的威胁:在某种程度上,这些方案明显地干扰了普通用途,它们作为替代门的可行性被削弱了。对DRM方案最严重的威胁可能不是来自特定的复杂攻击,而是来自自然幻觉的消散。
{"title":"Is DRM working?: how could we tell?","authors":"Bruce E. Boyden","doi":"10.1145/2046631.2046633","DOIUrl":"https://doi.org/10.1145/2046631.2046633","url":null,"abstract":"The success or failure of digital rights management is often taken in legal circles to be a technological question: has a particular scheme already been cracked? How broadly is protected content being redistributed? Can any scheme provide absolute security for content? By these measures, DRM, at least in its most visible applications, has been a failure, as has its legal bulwark, the Digital Millennium Copyright Act. Most widely available schemes are cracked within a few years of release. And due to the nature of the Internet, breaking a scheme once means it is broken everywhere. Under these conditions, absolute security is both required and impossible. This is the so-called \"Darknet\" hypothesis, first described at the ACM-DRM workshop nine years ago.\u0000 But the success or failure of DRM and anticircumvention policy generally is also a legal question, or more properly, a question about how law and technology interact with society. Assessing DRM's success therefore requires first determining its place in a copyright landscape that is undergoing a fundamental transformation. That transformation can be described simply as a disappearance of gates. Copyright relies on a world that makes copying without permission costly and difficult. That is, it relies on natural choke points at which access to content can be traded for money.\u0000 Those natural choke points, or \"gates,\" are disappearing. DRM is an attempt to reestablish a sort of gate, and its success or failure in any given application depends on how well it mimics the real-world gates it is replacing. And that is primarily a social question, not a technological one. Furthermore, it indicates a different set of threats to DRM schemes, and to the policy embodied in the DMCA: to the extent such schemes visibly interfere with common uses, their viability as replacement gates is diminished. The gravest threat to DRM schemes may come not from a particular sophisticated attack, but rather from a dissipation of the illusion of naturalness.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114609773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fast and adaptive tracing strategies for 3-secure fingerprint watermarking codes 三安全指纹水印码的快速自适应跟踪策略
Pub Date : 2011-10-21 DOI: 10.1145/2046631.2046640
Marcel Schäfer, Waldemar Berchtold, M. Steinebach
Fingerprinting codes are mechanisms to increase the security of transaction watermarking. Digital transaction watermarking is an accepted mechanism to discourage illegal distribution of multimedia. Here copies of the same content are distributed with individual markings. Simple but effective attacks on transaction watermarking are collusion attacks where multiple individualized copies of the work are compared in order to detect and attack the watermark positions and thus create a counterfeited watermark. One common countermeasure is given by fingerprinting codes. The main challenge is to provide codes which are highly secure, reliable and, at the same time, provide a sufficiently compact code length according to the payload limitations of current watermarking algorithms. Applying such codes in practice, the codes have to face additional challenges: Most operators arrogate small amounts of time for the code generation and embedding process and for the detection and accusation process. In this article, we describe a new fast but fair fingerprinting code to detect a collusion of up to three colluders. The code is very flexible and consciously kept simple to be adaptive and fast in order to stay applicable for all demands of potential appliers. Using accusation sums we are able to make a decision about which kind of attack strategy the colluders may have used. Accordingly the algorithm is split into two different tracing strategies. Both are based on discarding as many fingerprints as possible and only consider the most suspicious.
指纹码是一种提高交易水印安全性的机制。数字交易水印是一种公认的防止多媒体非法传播的机制。在这里,相同内容的副本以单独的标记分发。对交易水印的简单而有效的攻击是串通攻击,串通攻击是通过比较多个单独的作品副本来检测和攻击水印位置,从而产生伪造水印。一种常见的对策是指纹编码。主要的挑战是提供高度安全、可靠的代码,同时根据当前水印算法的有效载荷限制提供足够紧凑的代码长度。在实际应用这些代码时,代码还面临着额外的挑战:大多数运营商在代码生成和嵌入过程以及检测和指控过程中占用了少量时间。在本文中,我们描述了一种新的快速而公平的指纹识别代码,用于检测多达三个共谋者的共谋。代码非常灵活,并且有意识地保持简单,以适应和快速,以便适用于潜在应用程序的所有需求。使用指控和,我们能够决定共谋者可能使用的攻击策略。因此,该算法被分为两种不同的跟踪策略。两者都是基于丢弃尽可能多的指纹,只考虑最可疑的指纹。
{"title":"Fast and adaptive tracing strategies for 3-secure fingerprint watermarking codes","authors":"Marcel Schäfer, Waldemar Berchtold, M. Steinebach","doi":"10.1145/2046631.2046640","DOIUrl":"https://doi.org/10.1145/2046631.2046640","url":null,"abstract":"Fingerprinting codes are mechanisms to increase the security of transaction watermarking. Digital transaction watermarking is an accepted mechanism to discourage illegal distribution of multimedia. Here copies of the same content are distributed with individual markings. Simple but effective attacks on transaction watermarking are collusion attacks where multiple individualized copies of the work are compared in order to detect and attack the watermark positions and thus create a counterfeited watermark.\u0000 One common countermeasure is given by fingerprinting codes. The main challenge is to provide codes which are highly secure, reliable and, at the same time, provide a sufficiently compact code length according to the payload limitations of current watermarking algorithms. Applying such codes in practice, the codes have to face additional challenges: Most operators arrogate small amounts of time for the code generation and embedding process and for the detection and accusation process.\u0000 In this article, we describe a new fast but fair fingerprinting code to detect a collusion of up to three colluders. The code is very flexible and consciously kept simple to be adaptive and fast in order to stay applicable for all demands of potential appliers. Using accusation sums we are able to make a decision about which kind of attack strategy the colluders may have used. Accordingly the algorithm is split into two different tracing strategies. Both are based on discarding as many fingerprints as possible and only consider the most suspicious.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"177 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134160852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Integrated circuit digital rights management techniques using physical level characterization 使用物理层表征的集成电路数字版权管理技术
Pub Date : 2011-10-21 DOI: 10.1145/2046631.2046635
Sheng Wei, F. Koushanfar, M. Potkonjak
Digital rights management (DRM) of integrated circuits (ICs) is a crucially important task both economically and strategically. Several IC metering techniques have been proposed, but until now their effectiveness for royalty management has not been quantified. IC auditing is an important DRM step that goes beyond metering; it not only detects that a pirated IC has been produced but also determines the quantity of pirated ICs. Our strategic objective is to create a new intrinsic passive metering technique as well as the first IC auditing technique, and to maximize and quantify their effectiveness using statistical analysis and IC characterization techniques. Our main technical innovations include physical level gate characterization, a Bayesian approach for coincidence analysis, and an adaptation of animal counting techniques for IC production estimation. We evaluate the accuracy of the IC metering and auditing approach using simulations on a set of ISCAS benchmarks.
集成电路的数字版权管理(DRM)是一项极其重要的经济和战略任务。已经提出了几种IC计量技术,但直到现在,它们对特许权使用费管理的有效性还没有量化。IC审计是一个重要的DRM步骤,超越了计量;它不仅可以检测是否生产了盗版集成电路,还可以确定盗版集成电路的数量。我们的战略目标是创造一种新的内在被动计量技术以及第一种IC审计技术,并使用统计分析和IC表征技术最大化和量化其有效性。我们的主要技术创新包括物理层门表征,用于巧合分析的贝叶斯方法,以及用于IC生产估计的动物计数技术的适应。我们使用一组ISCAS基准模拟来评估IC计量和审计方法的准确性。
{"title":"Integrated circuit digital rights management techniques using physical level characterization","authors":"Sheng Wei, F. Koushanfar, M. Potkonjak","doi":"10.1145/2046631.2046635","DOIUrl":"https://doi.org/10.1145/2046631.2046635","url":null,"abstract":"Digital rights management (DRM) of integrated circuits (ICs) is a crucially important task both economically and strategically. Several IC metering techniques have been proposed, but until now their effectiveness for royalty management has not been quantified. IC auditing is an important DRM step that goes beyond metering; it not only detects that a pirated IC has been produced but also determines the quantity of pirated ICs. Our strategic objective is to create a new intrinsic passive metering technique as well as the first IC auditing technique, and to maximize and quantify their effectiveness using statistical analysis and IC characterization techniques. Our main technical innovations include physical level gate characterization, a Bayesian approach for coincidence analysis, and an adaptation of animal counting techniques for IC production estimation. We evaluate the accuracy of the IC metering and auditing approach using simulations on a set of ISCAS benchmarks.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116590663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Traitor tracing schemes for protected software implementations 受保护软件实现的叛逆者跟踪方案
Pub Date : 2011-10-21 DOI: 10.1145/2046631.2046636
M. Joye, Tancrède Lepoint
This paper considers the problem of converting an encryption scheme into a scheme in which there is one encryption process but several decryption processes. Each decryption process is made available as a protected software implementation (decoder). So, when some digital content is encrypted, a legitimate user can recover the content in clear using its own private software implementation. Moreover, it is possible to trace a decoder in a black-box fashion in case it is suspected to be an illegal copy. Our conversions assume software tamper-resistance.
本文研究了将一个加密方案转换为只有一个加密过程而有多个解密过程的方案的问题。每个解密过程都可以作为受保护的软件实现(解码器)使用。因此,当某些数字内容被加密时,合法用户可以使用自己的私有软件实现清晰地恢复内容。此外,如果怀疑解码器是非法拷贝,则可以以黑盒方式跟踪解码器。我们的转换假定软件防篡改。
{"title":"Traitor tracing schemes for protected software implementations","authors":"M. Joye, Tancrède Lepoint","doi":"10.1145/2046631.2046636","DOIUrl":"https://doi.org/10.1145/2046631.2046636","url":null,"abstract":"This paper considers the problem of converting an encryption scheme into a scheme in which there is one encryption process but several decryption processes. Each decryption process is made available as a protected software implementation (decoder). So, when some digital content is encrypted, a legitimate user can recover the content in clear using its own private software implementation. Moreover, it is possible to trace a decoder in a black-box fashion in case it is suspected to be an illegal copy. Our conversions assume software tamper-resistance.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122004903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A rights management approach to protection of privacy in a cloud of electronic health records 在电子健康记录云环境中保护隐私的权利管理方法
Pub Date : 2011-10-17 DOI: 10.1145/2046631.2046637
Mohammad Jafari, R. Safavi-Naini, N. Sheppard
A patient-centric DRM approach is proposed for protecting privacy of health records stored in a cloud storage based on the patient's preferences and without the need to trust the service provider. Contrary to the current server-side access control solutions, this approach protects the privacy of records from the service provider, and also controls the usage of data after it is released to an authorized user.
提出了一种以患者为中心的DRM方法,用于根据患者的偏好保护存储在云存储中的健康记录的隐私,而无需信任服务提供商。与当前的服务器端访问控制解决方案相反,这种方法可以保护记录的隐私不受服务提供者的侵犯,并且还可以控制数据被释放给授权用户后的使用情况。
{"title":"A rights management approach to protection of privacy in a cloud of electronic health records","authors":"Mohammad Jafari, R. Safavi-Naini, N. Sheppard","doi":"10.1145/2046631.2046637","DOIUrl":"https://doi.org/10.1145/2046631.2046637","url":null,"abstract":"A patient-centric DRM approach is proposed for protecting privacy of health records stored in a cloud storage based on the patient's preferences and without the need to trust the service provider. Contrary to the current server-side access control solutions, this approach protects the privacy of records from the service provider, and also controls the usage of data after it is released to an authorized user.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131653941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
A chameleon encryption scheme resistant to known-plaintext attack 变色龙加密方案抵抗已知明文攻击
Pub Date : 2010-10-04 DOI: 10.1145/1866870.1866876
E. Chang, Chengfang Fang, Jia Xu
From a ciphertext and a secret key assigned to a user, the decryption of a Chameleon encryption scheme produces a message which is the plaintext embedded with a watermark associated to the user. Most existing constructions of Chameleon encryption scheme are LUT (lookup table)-based, where a secret LUT plays the role of the master key and each user has a noisy version of the secret LUT. LUT-based methods have the limitation that the secrecy of the master key, under known-plaintext attack (KPA), relies on the difficulty in solving large linear system. In other words, with some knowledge of the plaintext, a dishonest user is able to derive the LUT, or an approximation of the LUT by solving a linear system. Resistance to such attack is crucial in the context of multimedia encryption since multimedia objects inherently contain high redundancies. Furthermore, for efficiency in decryption, the underlying linear system is likely to be sparse or not overly large, and hence can be solved using reasonable computing resource. In our experiment, a desktop PC is able to find a LUT (with 216 entries) within 2 hours. We propose a scheme that is resistant to KPA. The core of the scheme is a MUTABLE-PRNG (Pseudo Random Number Generator) whereby different but similar sequences are generated from related seeds. We generate such sequence from multiple pseudo random sequences based on majority-vote, and enhance its performance using error-correcting code. The proposed scheme is very simple and it is easy to show that it is resistant to KPA under reasonable cryptographic assumptions. However, it is not clear how much information on the original plaintext is leaked from the watermarked copies. We analyze the scheme and quantify the information loss using average conditional entropy.
从分配给用户的密文和密钥中,变色龙加密方案的解密产生一条消息,该消息是嵌入与用户相关的水印的明文。变色龙加密方案的大多数现有结构都是基于LUT(查找表)的,其中一个秘密LUT扮演主密钥的角色,每个用户都有一个秘密LUT的噪声版本。基于lut的方法在已知明文攻击(KPA)下的主密钥保密性依赖于求解大型线性系统的难易性。换句话说,通过对明文的一些了解,不诚实的用户能够通过求解线性系统推导出LUT,或LUT的近似值。在多媒体加密环境中,抵抗这种攻击是至关重要的,因为多媒体对象固有地包含高冗余。此外,为了提高解密的效率,底层的线性系统可能是稀疏的或不是过大的,因此可以使用合理的计算资源进行求解。在我们的实验中,一台桌面PC能够在2小时内找到一个LUT(包含216个条目)。我们提出了一种抗KPA的方案。该方案的核心是一个可变prng(伪随机数生成器),通过该生成器可以从相关的种子生成不同但相似的序列。我们基于多数投票从多个伪随机序列生成该序列,并使用纠错码增强其性能。所提出的方案非常简单,并且在合理的密码学假设下很容易证明它是抗KPA的。然而,目前尚不清楚原始明文中有多少信息从带水印的副本中泄露出来。我们分析了该方案,并使用平均条件熵来量化信息损失。
{"title":"A chameleon encryption scheme resistant to known-plaintext attack","authors":"E. Chang, Chengfang Fang, Jia Xu","doi":"10.1145/1866870.1866876","DOIUrl":"https://doi.org/10.1145/1866870.1866876","url":null,"abstract":"From a ciphertext and a secret key assigned to a user, the decryption of a Chameleon encryption scheme produces a message which is the plaintext embedded with a watermark associated to the user. Most existing constructions of Chameleon encryption scheme are LUT (lookup table)-based, where a secret LUT plays the role of the master key and each user has a noisy version of the secret LUT. LUT-based methods have the limitation that the secrecy of the master key, under known-plaintext attack (KPA), relies on the difficulty in solving large linear system. In other words, with some knowledge of the plaintext, a dishonest user is able to derive the LUT, or an approximation of the LUT by solving a linear system. Resistance to such attack is crucial in the context of multimedia encryption since multimedia objects inherently contain high redundancies. Furthermore, for efficiency in decryption, the underlying linear system is likely to be sparse or not overly large, and hence can be solved using reasonable computing resource. In our experiment, a desktop PC is able to find a LUT (with 216 entries) within 2 hours. We propose a scheme that is resistant to KPA. The core of the scheme is a MUTABLE-PRNG (Pseudo Random Number Generator) whereby different but similar sequences are generated from related seeds. We generate such sequence from multiple pseudo random sequences based on majority-vote, and enhance its performance using error-correcting code. The proposed scheme is very simple and it is easy to show that it is resistant to KPA under reasonable cryptographic assumptions. However, it is not clear how much information on the original plaintext is leaked from the watermarked copies. We analyze the scheme and quantify the information loss using average conditional entropy.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"187 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129509079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust fingerprinting codes: a near optimal construction 强大的指纹识别代码:一个近乎最佳的结构
Pub Date : 2010-10-04 DOI: 10.1145/1866870.1866873
D. Boneh, A. Kiayias, H. Montgomery
Fingerprinting codes, originally designed for embedding traceable fingerprints in digital content, have many applications in cryptography; most notably, they are used to construct traitor tracing systems. Recently there has been some interest in constructing robust fingerprinting codes: codes capable of tracing words even when the pirate adversarially destroys a δ fraction of the marks in the fingerprint. An early construction due to Boneh and Naor produces codewords whose length is proportional to c4/(1-δ)2 where c is the number of words at the adversary's disposal. Recently Nuida developed a scheme with codewords of length proportional to (c log c)2/(1-δ) 2. In this paper we introduce a new technique for constructing codes whose length is proportional to (c log c)2/(1-δ), which is asymptotically optimal up to logarithmic factors. These new codes lead to traitor tracing systems with constant size ciphertext and asymptotically shorter secret keys than previously possible.
指纹码最初是为了在数字内容中嵌入可追踪的指纹而设计的,在密码学中有许多应用;最值得注意的是,它们被用来构造叛逆者跟踪系统。最近,人们对构建健壮的指纹识别代码产生了一些兴趣:即使海盗破坏了指纹中的δ部分标记,这些代码也能追踪单词。由于Boneh和Naor的早期构造产生的码字长度与c4/(1-δ)2成正比,其中c是对手可以使用的单词数。最近,Nuida开发了一种码字长度与(c log c)2/(1-δ) 2成比例的方案。本文介绍了一种构造长度与(c log c)2/(1-δ)成正比的码的新技术,该技术在对数因子范围内是渐近最优的。这些新代码导致叛逆者跟踪系统具有恒定大小的密文和比以前可能的渐进更短的密钥。
{"title":"Robust fingerprinting codes: a near optimal construction","authors":"D. Boneh, A. Kiayias, H. Montgomery","doi":"10.1145/1866870.1866873","DOIUrl":"https://doi.org/10.1145/1866870.1866873","url":null,"abstract":"Fingerprinting codes, originally designed for embedding traceable fingerprints in digital content, have many applications in cryptography; most notably, they are used to construct traitor tracing systems. Recently there has been some interest in constructing <i>robust</i> fingerprinting codes: codes capable of tracing words even when the pirate adversarially destroys a δ fraction of the marks in the fingerprint. An early construction due to Boneh and Naor produces codewords whose length is proportional to <i>c</i><sup>4</sup>/(1-δ)<sup>2</sup> where <i>c</i> is the number of words at the adversary's disposal. Recently Nuida developed a scheme with codewords of length proportional to (<i>c</i> log <i>c</i>)<sup>2</sup>/(1-δ) <sup>2</sup>. In this paper we introduce a new technique for constructing codes whose length is proportional to (<i>c</i> log <i>c</i>)<sup>2</sup>/(1-δ), which is asymptotically optimal up to logarithmic factors. These new codes lead to traitor tracing systems with constant size ciphertext and asymptotically shorter secret keys than previously possible.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127789839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
New construction of identity-based proxy re-encryption 基于身份的代理重加密新结构
Pub Date : 2010-10-04 DOI: 10.1145/1866870.1866880
Song Luo, Jian-bin Hu, Zhong Chen
A proxy re-encryption (PRE) scheme involves three parties: Alice, Bob, and a proxy. PRE allows the proxy to translate a ciphertext encrypted under Alice's public key into one that can be decrypted by Bob's secret key. We present a general method to construct an identity-based proxy re-encryption scheme from an existing identity-based encryption scheme. The transformed scheme satisfies the properties of PRE, such as unidirectionality, non-interactivity and multi-use. Moreover, the proposed scheme has master key security, allows the encryptor to decide whether the ciphertext can be re-encrypted.
代理重新加密(PRE)方案涉及三方:Alice、Bob和代理。PRE允许代理将在Alice的公钥下加密的密文转换为可以由Bob的秘钥解密的密文。提出了一种从现有的基于身份的加密方案构造基于身份的代理重加密方案的通用方法。转换后的方案满足PRE的单向性、非交互性和多用途等特性。此外,该方案具有主密钥安全性,允许加密者自行决定是否可以对密文进行重新加密。
{"title":"New construction of identity-based proxy re-encryption","authors":"Song Luo, Jian-bin Hu, Zhong Chen","doi":"10.1145/1866870.1866880","DOIUrl":"https://doi.org/10.1145/1866870.1866880","url":null,"abstract":"A proxy re-encryption (PRE) scheme involves three parties: Alice, Bob, and a proxy. PRE allows the proxy to translate a ciphertext encrypted under Alice's public key into one that can be decrypted by Bob's secret key. We present a general method to construct an identity-based proxy re-encryption scheme from an existing identity-based encryption scheme. The transformed scheme satisfies the properties of PRE, such as unidirectionality, non-interactivity and multi-use. Moreover, the proposed scheme has master key security, allows the encryptor to decide whether the ciphertext can be re-encrypted.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128041243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An introduction to interoperable digital rights locker 介绍了可互操作的数字版权锁
Pub Date : 2010-10-04 DOI: 10.1145/1866870.1866881
E. Diehl, A. Robert
This document introduces the concept of an Interoperable Rights Locker which uses two elements: a digital rights locker that manages the consumer rights and a single interoperable format which enables portability. This concept is the most advanced model of DRM interoperability. The concept is illustrated by Disney's KeyChest system.
本文档介绍了可互操作版权锁的概念,它使用两个元素:管理消费者权利的数字版权锁和支持可移植性的单一可互操作格式。这个概念是DRM互操作性的最先进模型。迪士尼的KeyChest系统说明了这一概念。
{"title":"An introduction to interoperable digital rights locker","authors":"E. Diehl, A. Robert","doi":"10.1145/1866870.1866881","DOIUrl":"https://doi.org/10.1145/1866870.1866881","url":null,"abstract":"This document introduces the concept of an Interoperable Rights Locker which uses two elements: a digital rights locker that manages the consumer rights and a single interoperable format which enables portability. This concept is the most advanced model of DRM interoperability. The concept is illustrated by Disney's KeyChest system.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122012415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
ACM Digital Rights Management Workshop
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1