首页 > 最新文献

ACM Digital Rights Management Workshop最新文献

英文 中文
On the security of a public-key traitor tracing scheme with sublinear ciphertext size 具有次线性密文大小的公钥叛逆者跟踪方案的安全性研究
Pub Date : 2009-11-09 DOI: 10.1145/1655048.1655050
A. Kiayias, Serdar Pehlivanoglu
Traitor tracing refers to a class of encryption schemes that can be used to deter key-leakage. They apply to a setting that involves many receivers, each one receiving a fingerprinted decryption key. If a set of malicious receivers (also known as traitors) constructs an illicit decoder then a tracing mechanism enables an authority to identify at least one of the traitors. The very first traitor tracing scheme that has sublinear ciphertext size and is capable of tracing unambiguously illicit decoders that may shut-down (or employ some sort of self-defensive mechanism that would be adverse to tracing) was proposed in AsiaCrypt 2004 by Matsushita and Imai. In this work we demonstrate that this scheme is susceptible to an attack by an illicit decoder that not only evades tracing but results with high likelihood in the incrimination of an innocent user. Our attack is based on the fact that an illicit decoder can decompose a ciphertext to a set of components that can be submitted to a statistical test which distinguishes between tracing and regular system operation. The statistical distance between the two distributions converges to 1 as the number of traitors grows with an exponential rate in the number of traitors. After demonstrating our attack we also present a way to repair the construction as long as the traitors are not spaced too far apart in the user population. In particular we devise a transmission mechanism that eliminates the discrepancies between the tracing operation and the regular operation in the system and works against illicit decoders that are correct with sufficiently high probability.
叛逆者跟踪指的是一类可以用来阻止密钥泄露的加密方案。它们适用于涉及许多接收者的设置,每个接收者接收一个指纹解密密钥。如果一组恶意接收者(也称为叛徒)构造了一个非法解码器,那么跟踪机制使权威机构能够识别至少一个叛徒。2004年,Matsushita和Imai在AsiaCrypt上提出了第一个具有次线性密文大小并能够跟踪可能关闭(或采用某种不利于跟踪的自我防御机制)的明确非法解码器的叛逆者跟踪方案。在这项工作中,我们证明了该方案容易受到非法解码器的攻击,该解码器不仅可以逃避跟踪,而且很可能导致无辜用户被定罪。我们的攻击是基于这样一个事实:非法解码器可以将密文分解为一组组件,这些组件可以提交给统计测试,该测试可以区分跟踪和常规系统操作。当叛徒数量以指数速率增长时,两个分布之间的统计距离收敛于1。在演示了我们的攻击之后,我们还提出了一种修复建筑的方法,只要叛徒在用户群中间隔不太远。特别是,我们设计了一种传输机制,消除了系统中跟踪操作与常规操作之间的差异,并可以对抗具有足够高概率正确的非法解码器。
{"title":"On the security of a public-key traitor tracing scheme with sublinear ciphertext size","authors":"A. Kiayias, Serdar Pehlivanoglu","doi":"10.1145/1655048.1655050","DOIUrl":"https://doi.org/10.1145/1655048.1655050","url":null,"abstract":"Traitor tracing refers to a class of encryption schemes that can be used to deter key-leakage. They apply to a setting that involves many receivers, each one receiving a fingerprinted decryption key. If a set of malicious receivers (also known as traitors) constructs an illicit decoder then a tracing mechanism enables an authority to identify at least one of the traitors. The very first traitor tracing scheme that has sublinear ciphertext size and is capable of tracing unambiguously illicit decoders that may shut-down (or employ some sort of self-defensive mechanism that would be adverse to tracing) was proposed in AsiaCrypt 2004 by Matsushita and Imai.\u0000 In this work we demonstrate that this scheme is susceptible to an attack by an illicit decoder that not only evades tracing but results with high likelihood in the incrimination of an innocent user. Our attack is based on the fact that an illicit decoder can decompose a ciphertext to a set of components that can be submitted to a statistical test which distinguishes between tracing and regular system operation. The statistical distance between the two distributions converges to 1 as the number of traitors grows with an exponential rate in the number of traitors. After demonstrating our attack we also present a way to repair the construction as long as the traitors are not spaced too far apart in the user population. In particular we devise a transmission mechanism that eliminates the discrepancies between the tracing operation and the regular operation in the system and works against illicit decoders that are correct with sufficiently high probability.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115187023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A simple construction for public-key encryption with revocable anonymity: the honest-sender case 具有可撤销匿名性的公钥加密的简单构造:诚实发送方情况
Pub Date : 2009-11-09 DOI: 10.1145/1655048.1655051
D. Alessio, M. Joye
This paper presents a generic and simple transformation that adds traceability to an anonymous encryption scheme. We focus on the case of honest senders, which finds applications in many real-life scenarios. Advantageously, our transformation can be applied to already deployed public-key infrastructures. Two concrete implementations are provided.
本文提出了一种通用而简单的转换,为匿名加密方案增加了可追溯性。我们关注诚实发送者的情况,它在许多现实生活场景中都有应用。有利的是,我们的转换可以应用于已经部署的公钥基础设施。提供了两个具体的实现。
{"title":"A simple construction for public-key encryption with revocable anonymity: the honest-sender case","authors":"D. Alessio, M. Joye","doi":"10.1145/1655048.1655051","DOIUrl":"https://doi.org/10.1145/1655048.1655051","url":null,"abstract":"This paper presents a generic and simple transformation that adds traceability to an anonymous encryption scheme. We focus on the case of honest senders, which finds applications in many real-life scenarios. Advantageously, our transformation can be applied to already deployed public-key infrastructures. Two concrete implementations are provided.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"602 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115491627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An implementation experience of domain management in marlin 在marlin中实现域管理的经验
Pub Date : 2009-11-09 DOI: 10.1145/1655048.1655054
S. Keoh, Koen Vrielink
Digital Rights Management (DRM) is used to protect copyrighted content from unauthorized use. However, this has taken away the jurisdiction of the consumers over their purchased content as they can no longer freely access the content at any place using any device; given that the license authorizing the consumption of content is typically bound to a particular device. Domain Management provides the flexibility to the consumers to manage their purchased content as they are given the rights to govern their own domain membership. Consumers can dynamically add and remove devices from the domain subject to a domain policy that complies with the policy set by content owners or service providers. We share our implementation experience of domain management using a DRM technology called Marlin. We perceive this work as the first local domain management implementation in a real life practical DRM System.
数字版权管理(DRM)用于保护受版权保护的内容不被未经授权的使用。然而,这剥夺了消费者对他们购买的内容的管辖权,因为他们再也不能在任何地方使用任何设备自由访问内容;鉴于授权内容消费的许可证通常绑定到特定设备。域管理为消费者提供了管理其购买内容的灵活性,因为他们被赋予了管理自己的域成员资格的权利。消费者可以根据内容所有者或服务提供者设置的策略,动态地从域主题中添加和删除设备。我们分享使用名为Marlin的DRM技术进行域管理的实现经验。我们认为这项工作是现实生活中实际DRM系统中的第一个本地域管理实现。
{"title":"An implementation experience of domain management in marlin","authors":"S. Keoh, Koen Vrielink","doi":"10.1145/1655048.1655054","DOIUrl":"https://doi.org/10.1145/1655048.1655054","url":null,"abstract":"Digital Rights Management (DRM) is used to protect copyrighted content from unauthorized use. However, this has taken away the jurisdiction of the consumers over their purchased content as they can no longer freely access the content at any place using any device; given that the license authorizing the consumption of content is typically bound to a particular device. Domain Management provides the flexibility to the consumers to manage their purchased content as they are given the rights to govern their own domain membership. Consumers can dynamically add and remove devices from the domain subject to a domain policy that complies with the policy set by content owners or service providers. We share our implementation experience of domain management using a DRM technology called Marlin. We perceive this work as the first local domain management implementation in a real life practical DRM System.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125702040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Broadcast encryption versus public key cryptography in content protection systems 内容保护系统中的广播加密与公钥加密
Pub Date : 2009-11-09 DOI: 10.1145/1655048.1655055
J. Lotspiech
Broadcast encryption and public-key cryptography are two competing key management schemes. Both are in use today, although public key is much more pervasive (pervasive in the number of systems, not necessarily in the number of devices). In certain applications, especially the content protection or "Digital Rights Management" application, broadcast encryption seems to offer real advantages. In the last two or three years, advances have been made which offer new functionality to broadcast-encryption systems: a "signature-like" function, a device authentication protocol, "unified media key blocks" enhancing forensics, and "security classes". These new advances are summarized in this paper. The device authentication protocol has not previously been described in the academic literature, although it has been proposed in commercial systems. The author believes the reason that broadcast encryption has not been used more frequently in content protection is more due to system designers being unfamiliar with it, and less due to any advantages of public-key cryptography. The author hopes that this paper might begin to reverse this trend.
广播加密和公钥加密是两种相互竞争的密钥管理方案。这两种方法目前都在使用,尽管公钥更为普遍(在系统数量上普遍,而不一定在设备数量上普遍)。在某些应用程序中,特别是内容保护或“数字版权管理”应用程序,广播加密似乎提供了真正的优势。在过去的两三年里,已经取得了一些进步,为广播加密系统提供了新的功能:“类似签名”的功能、设备认证协议、增强取证的“统一媒体密钥块”和“安全等级”。本文对这些新进展进行了综述。设备认证协议以前没有在学术文献中描述,尽管它已经在商业系统中提出。笔者认为,广播加密在内容保护中没有得到更广泛的应用,更多的是由于系统设计者对其不熟悉,而不是由于公钥加密的任何优势。作者希望本文可以开始扭转这一趋势。
{"title":"Broadcast encryption versus public key cryptography in content protection systems","authors":"J. Lotspiech","doi":"10.1145/1655048.1655055","DOIUrl":"https://doi.org/10.1145/1655048.1655055","url":null,"abstract":"Broadcast encryption and public-key cryptography are two competing key management schemes. Both are in use today, although public key is much more pervasive (pervasive in the number of systems, not necessarily in the number of devices). In certain applications, especially the content protection or \"Digital Rights Management\" application, broadcast encryption seems to offer real advantages. In the last two or three years, advances have been made which offer new functionality to broadcast-encryption systems: a \"signature-like\" function, a device authentication protocol, \"unified media key blocks\" enhancing forensics, and \"security classes\". These new advances are summarized in this paper. The device authentication protocol has not previously been described in the academic literature, although it has been proposed in commercial systems.\u0000 The author believes the reason that broadcast encryption has not been used more frequently in content protection is more due to system designers being unfamiliar with it, and less due to any advantages of public-key cryptography. The author hopes that this paper might begin to reverse this trend.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123020870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Obfuscating straight line arithmetic programs 模糊直线算术程序
Pub Date : 2009-11-09 DOI: 10.1145/1655048.1655057
S. Narayanan, A. Raghunathan, R. Venkatesan
Program Obfuscation that renders any given program essentially equivalent to a black box, while desirable, is impossible [4] in the general polynomial time adversary models. It is natural to search for positive results under restricted programs (e.g., point functions [20, 2] POBDDs [10], cryptographic primitives [17, 12, 13]. Here we study straight line arithmetic programs. Our model of obfuscation requires an attacker to produce the entire code only by looking at the obfuscated program. We show that obfuscation is possible, assuming factoring is hard and we have access to a tamper-resistant hardware (or secure token). We also assume that the programs can be sampled from some distribution. Our results are based on extending a result due to Shamir cite{Sha93} on generation of hard to factor polynomials to straight line programs.
程序混淆使任何给定的程序本质上等同于黑箱,虽然是可取的,但在一般的多项式时间对手模型中是不可能的[4]。在受限的程序(例如,点函数[20,2],pobdd[10],密码原语[17,12,13])下搜索正结果是很自然的。这里我们学习直线算术程序。我们的混淆模型要求攻击者仅通过查看被混淆的程序来生成整个代码。我们展示了混淆是可能的,假设分解是困难的,并且我们可以访问防篡改硬件(或安全令牌)。我们还假设程序可以从某个分布中抽样。我们的结果是基于将Shamir cite{Sha93}关于难以分解多项式的生成扩展到直线规划的结果。
{"title":"Obfuscating straight line arithmetic programs","authors":"S. Narayanan, A. Raghunathan, R. Venkatesan","doi":"10.1145/1655048.1655057","DOIUrl":"https://doi.org/10.1145/1655048.1655057","url":null,"abstract":"Program Obfuscation that renders any given program essentially equivalent to a black box, while desirable, is impossible [4] in the general polynomial time adversary models. It is natural to search for positive results under restricted programs (e.g., point functions [20, 2] POBDDs [10], cryptographic primitives [17, 12, 13]. Here we study straight line arithmetic programs.\u0000 Our model of obfuscation requires an attacker to produce the entire code only by looking at the obfuscated program. We show that obfuscation is possible, assuming factoring is hard and we have access to a tamper-resistant hardware (or secure token). We also assume that the programs can be sampled from some distribution. Our results are based on extending a result due to Shamir cite{Sha93} on generation of hard to factor polynomials to straight line programs.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114213162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Efficient license validation in MPML DRM architecture 高效的MPML DRM体系结构许可验证
Pub Date : 2009-11-09 DOI: 10.1145/1655048.1655060
Amit Sachan, S. Emmanuel, M. Kankanhalli
Multiparty multilevel DRM architecture (MPML-DRM-A) involves multiple parties such as owner, multiple levels of distributors and consumers. The owner issues redistribution licenses to its distributors, who in turn generate and issue variations of these redistribution licenses to their sub-distributors. Also the distributors generate and issue usage licenses to the consumers to consume the contents. But, these variations of the redistribution licenses and usage licenses generated and issued by each distributor must be validated by a validation authority against the redistribution licenses that it has received. In MPML-DRM-A, there may exist multiple, different types of redistribution licenses for a content. Validation using multiple redistribution licenses may become difficult in real time. Further, storage of multiple redistribution licenses for validation presents a challenge of reducing storage space requirements. Hence, in this paper we propose a bit-vector transform based license organizing structure, and present a method to do the validation of issued licenses in the bit-vector transform domain efficiently. Experimental results show that our license organization structure helps to achieve low validation time and storage space complexity.
多方多层DRM体系结构(MPML-DRM-A)涉及多方,如所有者、多级发布者和消费者。所有者向其分销商颁发再分发许可证,这些分销商又生成这些再分发许可证的变体,并将其颁发给其子分销商。此外,分发者生成并向消费者颁发使用许可以使用内容。但是,由每个分发者生成和颁发的再分发许可证和使用许可证的这些变体必须由验证机构根据其收到的再分发许可证进行验证。在MPML-DRM-A中,一个内容可能存在多种不同类型的再分发许可。使用多个再分发许可证进行实时验证可能会变得困难。此外,为验证而存储多个再分发许可证提出了减少存储空间需求的挑战。因此,本文提出了一种基于位向量变换的许可证组织结构,并提出了一种在位向量变换域中有效地对已颁发许可证进行验证的方法。实验结果表明,我们的许可证组织结构有助于实现较低的验证时间和存储空间复杂度。
{"title":"Efficient license validation in MPML DRM architecture","authors":"Amit Sachan, S. Emmanuel, M. Kankanhalli","doi":"10.1145/1655048.1655060","DOIUrl":"https://doi.org/10.1145/1655048.1655060","url":null,"abstract":"Multiparty multilevel DRM architecture (MPML-DRM-A) involves multiple parties such as owner, multiple levels of distributors and consumers. The owner issues redistribution licenses to its distributors, who in turn generate and issue variations of these redistribution licenses to their sub-distributors. Also the distributors generate and issue usage licenses to the consumers to consume the contents. But, these variations of the redistribution licenses and usage licenses generated and issued by each distributor must be validated by a validation authority against the redistribution licenses that it has received. In MPML-DRM-A, there may exist multiple, different types of redistribution licenses for a content. Validation using multiple redistribution licenses may become difficult in real time. Further, storage of multiple redistribution licenses for validation presents a challenge of reducing storage space requirements. Hence, in this paper we propose a bit-vector transform based license organizing structure, and present a method to do the validation of issued licenses in the bit-vector transform domain efficiently. Experimental results show that our license organization structure helps to achieve low validation time and storage space complexity.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123123355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Tunneled TLS for multi-factor authentication 用于多因素身份验证的隧道TLS
Pub Date : 2009-04-23 DOI: 10.1145/2046631.2046639
D. Kirovski, Christopher Meek
When logging onto a remote server, s, from a distrusted terminal, c, one can leak secrets such as passwords and account data to malware. To address this problem, we rely on a trusted personal device, p, as the interface available to users for entering their login credentials. In our proposal, p would send the credentials to s using a tunneled TLS session routed via c. The tunneling would be done within an existing TLS session established between c and s. Upon validating the credentials, s would enable c to access the user account. Consequently, c would never see in plain-text user's credentials. As a powerful application, we show that p could use our protocol to execute a credit-card-like payment at a point-of-sale terminal, c, using an account managed by the card-issuing bank, s.
当从不受信任的终端c登录到远程服务器s时,可以将密码和帐户数据等机密泄露给恶意软件。为了解决这个问题,我们依赖于一个受信任的个人设备p作为用户输入其登录凭据的可用接口。在我们的提议中,p将使用通过c路由的隧道TLS会话将凭证发送给s。隧道将在c和s之间建立的现有TLS会话中完成。在验证凭证后,s将使c能够访问用户帐户。因此,c永远不会看到纯文本用户的凭据。作为一个功能强大的应用程序,我们展示了p可以使用我们的协议在销售点终端c上执行类似信用卡的支付,使用的是发卡银行管理的帐户s。
{"title":"Tunneled TLS for multi-factor authentication","authors":"D. Kirovski, Christopher Meek","doi":"10.1145/2046631.2046639","DOIUrl":"https://doi.org/10.1145/2046631.2046639","url":null,"abstract":"When logging onto a remote server, <i>s</i>, from a distrusted terminal, <i>c</i>, one can leak secrets such as passwords and account data to malware. To address this problem, we rely on a trusted personal device, <i>p</i>, as the interface available to users for entering their login credentials. In our proposal, <i>p</i> would send the credentials to <i>s</i> using a tunneled TLS session routed via <i>c</i>. The tunneling would be done within an existing TLS session established between <i>c</i> and <i>s</i>. Upon validating the credentials, <i>s</i> would enable <i>c</i> to access the user account. Consequently, <i>c</i> would never see in plain-text user's credentials. As a powerful application, we show that <i>p</i> could use our protocol to execute a credit-card-like payment at a point-of-sale terminal, <i>c</i>, using an account managed by the card-issuing bank, <i>s</i>.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124182161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A four-layer model for security of digital rights management 数字版权管理安全的四层模型
Pub Date : 2008-10-27 DOI: 10.1145/1456520.1456527
E. Diehl
Defining Digital Rights Management (DRM) is a complex task. There is no unique universal definition. There are many legal, economic, functional, and technical definitions. This complexity induces also that there is not one unique modeling of DRM. Each model should help to compare different DRM systems and easily highlight the differences and the similarities between them. One of the weaknesses of the current models is that none puts specifically the focus on the most important characteristics of DRM: protection of content and rights management. We propose a four-layer model that complements traditional ones. Using trust layer, rights management layer, rights enforcement layer, and content protection layer, this model is security oriented. It is suitable to describe any content protections such as DRM, conditional access, copy protection or even pre-recorded content protection systems.
定义数字版权管理(DRM)是一项复杂的任务。没有唯一的通用定义。有许多法律的、经济的、功能的和技术的定义。这种复杂性还导致不存在唯一的DRM建模。每个模型都应该有助于比较不同的DRM系统,并容易地突出它们之间的异同。当前模型的弱点之一是没有一个特别关注DRM最重要的特征:内容保护和权利管理。我们提出了一个补充传统模型的四层模型。该模型采用信任层、权限管理层、权限执行层和内容保护层,是面向安全的。它适用于描述任何内容保护,例如DRM、条件访问、复制保护甚至预录制内容保护系统。
{"title":"A four-layer model for security of digital rights management","authors":"E. Diehl","doi":"10.1145/1456520.1456527","DOIUrl":"https://doi.org/10.1145/1456520.1456527","url":null,"abstract":"Defining Digital Rights Management (DRM) is a complex task. There is no unique universal definition. There are many legal, economic, functional, and technical definitions. This complexity induces also that there is not one unique modeling of DRM. Each model should help to compare different DRM systems and easily highlight the differences and the similarities between them. One of the weaknesses of the current models is that none puts specifically the focus on the most important characteristics of DRM: protection of content and rights management. We propose a four-layer model that complements traditional ones. Using trust layer, rights management layer, rights enforcement layer, and content protection layer, this model is security oriented. It is suitable to describe any content protections such as DRM, conditional access, copy protection or even pre-recorded content protection systems.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124771212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
A decision theoretic framework for analyzing binary hash-based content identification systems 一个用于分析二进制哈希内容识别系统的决策理论框架
Pub Date : 2008-10-27 DOI: 10.1145/1456520.1456532
Avinash L. Varna, A. Swaminathan, Min Wu
Content identification has many applications, ranging from preventing illegal sharing of copyrighted content on video sharing websites, to automatic identification and tagging of content. Several content identification techniques based on watermarking or robust hashes have been proposed in the literature, but they have mostly been evaluated through experiments. This paper analyzes binary hash-based content identification schemes under a decision theoretic framework and presents a lower bound on the length of the hash required to correctly identify multimedia content that may have undergone modifications. A practical scheme for content identification is evaluated under the proposed framework. The results obtained through experiments agree very well with the performance suggested by the theoretical analysis.
内容识别有很多应用,从防止在视频分享网站上非法分享有版权的内容,到自动识别和标记内容。文献中已经提出了几种基于水印或鲁棒哈希的内容识别技术,但它们大多通过实验进行了评估。本文在决策理论框架下分析了基于二进制哈希的内容识别方案,并给出了正确识别可能经过修改的多媒体内容所需的哈希长度的下界。在提出的框架下,评估了一个实用的内容识别方案。实验结果与理论分析结果吻合得很好。
{"title":"A decision theoretic framework for analyzing binary hash-based content identification systems","authors":"Avinash L. Varna, A. Swaminathan, Min Wu","doi":"10.1145/1456520.1456532","DOIUrl":"https://doi.org/10.1145/1456520.1456532","url":null,"abstract":"Content identification has many applications, ranging from preventing illegal sharing of copyrighted content on video sharing websites, to automatic identification and tagging of content. Several content identification techniques based on watermarking or robust hashes have been proposed in the literature, but they have mostly been evaluated through experiments. This paper analyzes binary hash-based content identification schemes under a decision theoretic framework and presents a lower bound on the length of the hash required to correctly identify multimedia content that may have undergone modifications. A practical scheme for content identification is evaluated under the proposed framework. The results obtained through experiments agree very well with the performance suggested by the theoretical analysis.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"165 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131691003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
Design rules for interoperable domains: controlling content dilution and content sharing 互操作域的设计规则:控制内容稀释和内容共享
Pub Date : 2008-10-27 DOI: 10.1145/1456520.1456529
G. Doërr, T. Kalker
In this paper we argue that improved interoperability between DRM systems is likely to benefit to all the actors in the content value chain. Moreover, we describe a domain-based approach to DRM interoperability. We discuss in some detail configuration aspects of such interoperable domains, and how they affect certain social aspects such as marriage and divorce. We conclude that interoperable domains offer a much needed flexibility, allowing users to more easily move between vertical silos and offering content owners a more flexible environment for selling content.
在本文中,我们认为改进DRM系统之间的互操作性可能会使内容价值链中的所有参与者受益。此外,我们还描述了一种基于域的DRM互操作性方法。我们将详细讨论这些可互操作域的配置方面,以及它们如何影响某些社会方面,如婚姻和离婚。我们得出的结论是,可互操作的域提供了非常需要的灵活性,允许用户更容易地在垂直筒仓之间移动,并为内容所有者提供更灵活的销售内容的环境。
{"title":"Design rules for interoperable domains: controlling content dilution and content sharing","authors":"G. Doërr, T. Kalker","doi":"10.1145/1456520.1456529","DOIUrl":"https://doi.org/10.1145/1456520.1456529","url":null,"abstract":"In this paper we argue that improved interoperability between DRM systems is likely to benefit to all the actors in the content value chain. Moreover, we describe a domain-based approach to DRM interoperability. We discuss in some detail configuration aspects of such interoperable domains, and how they affect certain social aspects such as marriage and divorce. We conclude that interoperable domains offer a much needed flexibility, allowing users to more easily move between vertical silos and offering content owners a more flexible environment for selling content.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133760123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
ACM Digital Rights Management Workshop
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1