首页 > 最新文献

ACM Digital Rights Management Workshop最新文献

英文 中文
Counterfeiting and anti-counterfeitingof software and content 软件和内容的制假和防伪
Pub Date : 2008-10-27 DOI: 10.1145/1456520.1456522
Y. Yacobi, Gideon Yaniv
We address a counterfeiter who pretends to be the legitimate producer of software or content, charges the same price as the latter and competes with her in the same market. We examine the legitimate producer's joint determination of the profit-maximizing price and intensity of monitoring the counterfeiter's illegal activity. Our approach involves an explicit solution of the profit-maximizing level of counterfeiting, based on a real probability of detection function. The analysis reveals that the profit-maximizing price is lower than the price set in the absence of counterfeiting and must be accompanied with some minimum level of monitoring to be positive. Depending on the level of counterfeiting, the profit-maximizing monitoring rate may rise or fall with an increase in the penalty rate or in the legitimate producer's share in the counterfeiter's fine and back payments, and may counter-intuitively rise with improvements in detection technology.
我们打击假冒软件或内容的合法生产者,收取与后者相同的价格,并在同一市场上与其竞争的造假者。我们考察了合法生产者对利润最大化价格的共同确定和对造假者非法活动的监控力度。我们的方法涉及一个明确的解决方案的利润最大化水平的假冒,基于一个真实的概率检测函数。分析表明,利润最大化的价格低于没有假冒的情况下设定的价格,并且必须伴随着某种最低水平的监控才能达到积极的效果。根据造假的程度,利润最大化的监测率可能会随着惩罚率的增加或合法生产者在伪造者罚款和拖欠款项中所占份额的增加而上升或下降,并可能随着检测技术的改进而反直觉地上升。
{"title":"Counterfeiting and anti-counterfeitingof software and content","authors":"Y. Yacobi, Gideon Yaniv","doi":"10.1145/1456520.1456522","DOIUrl":"https://doi.org/10.1145/1456520.1456522","url":null,"abstract":"We address a counterfeiter who pretends to be the legitimate producer of software or content, charges the same price as the latter and competes with her in the same market. We examine the legitimate producer's joint determination of the profit-maximizing price and intensity of monitoring the counterfeiter's illegal activity. Our approach involves an explicit solution of the profit-maximizing level of counterfeiting, based on a real probability of detection function. The analysis reveals that the profit-maximizing price is lower than the price set in the absence of counterfeiting and must be accompanied with some minimum level of monitoring to be positive. Depending on the level of counterfeiting, the profit-maximizing monitoring rate may rise or fall with an increase in the penalty rate or in the legitimate producer's share in the counterfeiter's fine and back payments, and may counter-intuitively rise with improvements in detection technology.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"242 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114414481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Adaptive traitor tracing for large anonymous attack 大型匿名攻击的自适应叛逆者跟踪
Pub Date : 2008-10-27 DOI: 10.1145/1456520.1456524
Hongxia Jin, J. Lotspiech, Michael J. Nelson, N. Megiddo
In this paper we focus on traitor tracing technologies for the anonymous re-broadcasting attack where the attackers re-distribute the per-content encrypting key or the decrypted plain content. To defend against an anonymous attack, content is usually built with different variations. For example, content is divided into multiple segments, each segment comes with multiple variations, and each variation is differently encrypted. Each user/player can only play back one variation per segment through the content. A typical traitor tracing scheme for re-broadcasting attack involves two basic steps, assigning the key/variation to devices (the assignment step) and detecting at least one traitor in the coalition when a series of pirated key/content are recovered (the coalition detection step). The traceability of a traitor tracing scheme is defined to be the number of recovered pirate copies of the content/keys needed in order to detect traitors. In [1] we presented a traitor detection scheme that tries to detect the entire coalition all together. This significantly improved the traditional one-by-one detection approaches in the literature. However, the traceability of the traitor detection scheme has a up limit that is constrained by the number of variations q one can build into the content. We are motivated to improve the traceability on a larger collusion attack and lift the up-limit on traceability with a given q. In this paper we will show a new traitor tracing approach that will assign the variations with skewed probabilities. Our approach not only lifts the tracing up-limit but also enables the tracing agency to assign the variations so as to maximize the traceability for a given coalition size. Our traceability results show that it is possible to achieve good traceability when traitor size exceeds q, and continue doing well even after the coalition size reaches q log q.
本文重点研究了针对匿名重广播攻击的叛逆者跟踪技术,攻击者将每个内容的加密密钥或解密后的明文内容重新分发。为了防御匿名攻击,内容通常使用不同的变体构建。例如,内容被分成多个片段,每个片段都有多个变体,每个变体都有不同的加密方式。每个用户/玩家只能通过内容播放每个片段的一个变体。针对重播攻击的典型叛逆者追踪方案包括两个基本步骤,将密钥/变异分配给设备(分配步骤),以及在恢复一系列盗版密钥/内容时,在联盟中发现至少一个叛逆者(联盟检测步骤)。叛徒跟踪方案的可追溯性被定义为检测叛徒所需的内容/密钥的恢复盗版副本的数量。在[1]中,我们提出了一个叛徒检测方案,它试图一起检测整个联盟。这大大改进了文献中传统的逐个检测方法。然而,叛徒检测方案的可追溯性有一个上限,该上限受到可以构建到内容中的变量q的数量的限制。我们有动力在更大的共谋攻击上改进可追溯性,并在给定q的情况下提高可追溯性的上限。在本文中,我们将展示一种新的叛徒跟踪方法,该方法将用倾斜概率分配变化。我们的方法不仅提高了跟踪的上限,而且使跟踪机构能够分配变化,从而最大限度地提高给定联盟规模的可追溯性。我们的可追溯性结果表明,当叛逆者的规模超过q时,可以实现良好的可追溯性,即使在联盟规模达到q log q后,也可以继续保持良好的可追溯性。
{"title":"Adaptive traitor tracing for large anonymous attack","authors":"Hongxia Jin, J. Lotspiech, Michael J. Nelson, N. Megiddo","doi":"10.1145/1456520.1456524","DOIUrl":"https://doi.org/10.1145/1456520.1456524","url":null,"abstract":"In this paper we focus on traitor tracing technologies for the anonymous re-broadcasting attack where the attackers re-distribute the per-content encrypting key or the decrypted plain content. To defend against an anonymous attack, content is usually built with different variations. For example, content is divided into multiple segments, each segment comes with multiple variations, and each variation is differently encrypted. Each user/player can only play back one variation per segment through the content.\u0000 A typical traitor tracing scheme for re-broadcasting attack involves two basic steps, assigning the key/variation to devices (the assignment step) and detecting at least one traitor in the coalition when a series of pirated key/content are recovered (the coalition detection step). The traceability of a traitor tracing scheme is defined to be the number of recovered pirate copies of the content/keys needed in order to detect traitors. In [1] we presented a traitor detection scheme that tries to detect the entire coalition all together. This significantly improved the traditional one-by-one detection approaches in the literature. However, the traceability of the traitor detection scheme has a up limit that is constrained by the number of variations q one can build into the content. We are motivated to improve the traceability on a larger collusion attack and lift the up-limit on traceability with a given q. In this paper we will show a new traitor tracing approach that will assign the variations with skewed probabilities. Our approach not only lifts the tracing up-limit but also enables the tracing agency to assign the variations so as to maximize the traceability for a given coalition size. Our traceability results show that it is possible to achieve good traceability when traitor size exceeds q, and continue doing well even after the coalition size reaches q log q.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127591142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Public-key traitor tracing from efficient decoding and unbounded enrollment: extended abstract 基于高效解码和无界注册的公钥叛逆者跟踪:扩展摘要
Pub Date : 2008-10-27 DOI: 10.1145/1456520.1456525
A. Kiayias, M. Yung
Public-key traitor-tracing schemes is a supporting technology for content distribution that discourages abuse and resale of cryptographic keys used for the distribution. These schemes enable a system manager to maintain a set of subscribers so that any external content provider can use the public key nature of the method and transmit data to the subscribers, while assuring that if a coalition of users generate a pirate deciphering device, they can be identified via a procedure called "traitor tracing." The usefulness of efficient decoding in this context was exemplified in the work of Boneh and Franklin that showed how a specific family of codes can be combined with ElGamal encryption to produce a public-key traitor tracing scheme that supports non-black-box traitor tracing and recovers all traitors that contributed to the pirate key. In this work we are motivated by the notion of "Traitor Tracing with unbounded enrollment" that we define here, and we look for proper implementation thereof. To this end, we first generalize the Boneh Franklin approach to arbitrary code families by introducing Extended ElGamal encryption and showing an explicit condition under which the encryption can be transformed to traitor tracing, while also identifying cases where such transformation would not work; the properties are presented in terms of efficient decoding algorithms. The approach sheds light on the superlogarithmic (non-black-box) traceability of the Kurosawa-Desmedt public-key traitor tracing scheme that was only shown to support efficient tracing for a logarithmic number of traitors (in the black-box sense, where it was shown that logarithmic is optimal). Recall that the original non-black-box tracing algorithm of this scheme was found to be insufficient. We also show how to take advantage of list decoding techniques for non-black-box traitor tracing to extend the number of traitors that can be successfully traced. Finally, the Kurosawa Desmedt scheme accompanied with our tracing method is shown to be the first construction to implement traitor tracing with unbounded enrollment for an optimal number of traitors (for such a scheme) in both the non-black-box tracing case and the black-box tracing case.
公钥叛逆者跟踪方案是一种支持内容分发的技术,它防止滥用和转售用于分发的加密密钥。这些方案使系统管理员能够维护一组订阅者,以便任何外部内容提供者都可以使用该方法的公钥特性并向订阅者传输数据,同时确保如果用户联盟生成盗版解密设备,则可以通过称为“叛徒跟踪”的过程识别它们。在这种情况下,高效解码的有用性在Boneh和Franklin的工作中得到了举例说明,他们展示了如何将特定的代码族与ElGamal加密相结合,以产生公钥叛逆者跟踪方案,该方案支持非黑盒叛逆者跟踪,并恢复对盗版密钥做出贡献的所有叛逆者。在这项工作中,我们的动机是我们在这里定义的“无界登记叛徒追踪”的概念,我们寻找适当的实现。为此,我们首先通过引入扩展ElGamal加密将Boneh Franklin方法推广到任意代码族,并展示了可以将加密转换为叛逆者跟踪的显式条件,同时还确定了这种转换无法工作的情况;从高效解码算法的角度给出了这些特性。该方法揭示了Kurosawa-Desmedt公钥叛逆者跟踪方案的超对数(非黑盒)可跟踪性,该方案仅支持对对数数量的叛逆者进行有效跟踪(在黑盒意义上,对数是最优的)。回想一下,该方案原来的非黑箱跟踪算法被发现是不够的。我们还展示了如何利用列表解码技术对非黑箱叛逆者进行跟踪,以扩展可以成功跟踪的叛逆者的数量。最后,Kurosawa Desmedt方案和我们的跟踪方法被证明是第一个在非黑箱跟踪情况和黑箱跟踪情况下实现无界登记叛徒最优数量(对于该方案)的叛徒跟踪的结构。
{"title":"Public-key traitor tracing from efficient decoding and unbounded enrollment: extended abstract","authors":"A. Kiayias, M. Yung","doi":"10.1145/1456520.1456525","DOIUrl":"https://doi.org/10.1145/1456520.1456525","url":null,"abstract":"Public-key traitor-tracing schemes is a supporting technology for content distribution that discourages abuse and resale of cryptographic keys used for the distribution. These schemes enable a system manager to maintain a set of subscribers so that any external content provider can use the public key nature of the method and transmit data to the subscribers, while assuring that if a coalition of users generate a pirate deciphering device, they can be identified via a procedure called \"traitor tracing.\"\u0000 The usefulness of efficient decoding in this context was exemplified in the work of Boneh and Franklin that showed how a specific family of codes can be combined with ElGamal encryption to produce a public-key traitor tracing scheme that supports non-black-box traitor tracing and recovers all traitors that contributed to the pirate key.\u0000 In this work we are motivated by the notion of \"Traitor Tracing with unbounded enrollment\" that we define here, and we look for proper implementation thereof. To this end, we first generalize the Boneh Franklin approach to arbitrary code families by introducing Extended ElGamal encryption and showing an explicit condition under which the encryption can be transformed to traitor tracing, while also identifying cases where such transformation would not work; the properties are presented in terms of efficient decoding algorithms. The approach sheds light on the superlogarithmic (non-black-box) traceability of the Kurosawa-Desmedt public-key traitor tracing scheme that was only shown to support efficient tracing for a logarithmic number of traitors (in the black-box sense, where it was shown that logarithmic is optimal). Recall that the original non-black-box tracing algorithm of this scheme was found to be insufficient. We also show how to take advantage of list decoding techniques for non-black-box traitor tracing to extend the number of traitors that can be successfully traced. Finally, the Kurosawa Desmedt scheme accompanied with our tracing method is shown to be the first construction to implement traitor tracing with unbounded enrollment for an optimal number of traitors (for such a scheme) in both the non-black-box tracing case and the black-box tracing case.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121528738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enforcing DRM policies across applications 跨应用程序实施DRM策略
Pub Date : 2008-10-27 DOI: 10.1145/1456520.1456535
S. Nair, A. Tanenbaum, Gabriela Gheorghe, B. Crispo
In this paper we present Trishul-UCON (T-UCON), a DRM system based on the UCON_ABC model. T-UCON is designed to be capable of enforcing not only application-specific policies, as any existing software-based DRM solution does, but also DRM policies across applications. This is achieved by binding the DRM policy only to the content it protects with no relations to the application(s) which will use this content. Furthermore, to guarantee that the policy is continuously enforced, we designed T-UCON as a JVM-based middleware that mediates the usage requests of any Java application to the protected content. Each request is granted or denied according to the content policy. We illustrate the unique features of T-UCON by using typical examples of DRM policies such as the pay-per-use and the use only N times scenarios. Preliminary results on the overhead of our solution are also provided.
本文提出了一种基于UCON_ABC模型的DRM系统——Trishul-UCON (T-UCON)。T-UCON不仅能够像任何现有的基于软件的DRM解决方案那样执行特定于应用程序的策略,而且还能够跨应用程序执行DRM策略。这是通过将DRM策略仅绑定到它所保护的内容,而与将使用该内容的应用程序没有关系来实现的。此外,为了保证策略的持续执行,我们将T-UCON设计为基于jvm的中间件,它将任何Java应用程序的使用请求调解到受保护的内容。根据内容策略授予或拒绝每个请求。我们通过使用DRM策略的典型示例(如按使用付费和仅使用N次场景)来说明T-UCON的独特功能。本文还提供了解决方案开销的初步结果。
{"title":"Enforcing DRM policies across applications","authors":"S. Nair, A. Tanenbaum, Gabriela Gheorghe, B. Crispo","doi":"10.1145/1456520.1456535","DOIUrl":"https://doi.org/10.1145/1456520.1456535","url":null,"abstract":"In this paper we present Trishul-UCON (T-UCON), a DRM system based on the UCON_ABC model. T-UCON is designed to be capable of enforcing not only application-specific policies, as any existing software-based DRM solution does, but also DRM policies across applications. This is achieved by binding the DRM policy only to the content it protects with no relations to the application(s) which will use this content. Furthermore, to guarantee that the policy is continuously enforced, we designed T-UCON as a JVM-based middleware that mediates the usage requests of any Java application to the protected content. Each request is granted or denied according to the content policy. We illustrate the unique features of T-UCON by using typical examples of DRM policies such as the pay-per-use and the use only N times scenarios. Preliminary results on the overhead of our solution are also provided.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132691636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Assessing privacy criteria for drm using eu privacy legislation 使用欧盟隐私立法评估drm的隐私标准
Pub Date : 2008-10-27 DOI: 10.1145/1456520.1456534
Anja Becker, A. Arnab, Mercè Serra
The main aim of this paper is to examine privacy protection legislations within the European Union (EU) and their implications for the deployment of Digital Rights Management (DRM) systems. For this purpose we note that there are two EU legislations of particular interest: Directive 95/46/EC and Directive 2002/58/EC. Based on these directives, we derive a list of elementary criteria for DRM systems and analyse the extent to which modern DRM systems may be built adhering to these requirements. In particular, we consider these implications in reference to a prospective deployment of an OMA DRM v2.0 system. Furthermore, we present seals for IT services and IT products that represent a way of standardizing privacy requirements for implementations.
本文的主要目的是研究欧盟(EU)内部的隐私保护立法及其对数字版权管理(DRM)系统部署的影响。为此,我们注意到有两项特别有趣的欧盟立法:指令95/46/EC和指令2002/58/EC。基于这些指令,我们导出了DRM系统的基本标准列表,并分析了现代DRM系统可以在多大程度上遵循这些要求来构建。特别地,我们将参考OMA DRM v2.0系统的预期部署来考虑这些含义。此外,我们还提出了IT服务和IT产品的印章,它们代表了实现的隐私需求标准化的一种方式。
{"title":"Assessing privacy criteria for drm using eu privacy legislation","authors":"Anja Becker, A. Arnab, Mercè Serra","doi":"10.1145/1456520.1456534","DOIUrl":"https://doi.org/10.1145/1456520.1456534","url":null,"abstract":"The main aim of this paper is to examine privacy protection legislations within the European Union (EU) and their implications for the deployment of Digital Rights Management (DRM) systems. For this purpose we note that there are two EU legislations of particular interest: Directive 95/46/EC and Directive 2002/58/EC. Based on these directives, we derive a list of elementary criteria for DRM systems and analyse the extent to which modern DRM systems may be built adhering to these requirements. In particular, we consider these implications in reference to a prospective deployment of an OMA DRM v2.0 system. Furthermore, we present seals for IT services and IT products that represent a way of standardizing privacy requirements for implementations.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115034298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
RSA-TBOS signcryption with proxy re-encryption 带有代理重加密的RSA-TBOS签名加密
Pub Date : 2008-10-27 DOI: 10.1145/1456520.1456531
Varad Kirtane, Pandu Rangan
The recent attack on Apple iTunes Digital Rights Management [17] has brought to light the usefulness of proxy re-encryption schemes for Digital Rights Management. It is known that the use of proxy re-encryption would have prevented the attack in [17]. With this utility in mind and with the added requirement of non-repudiation, we propose the first ever signcryption scheme with proxy re-encryption that does not involve bilinear maps. Our scheme is called RSA-TBOS-PRE and is based on the RSA-TBOS signcryption scheme of Mao and Malone-Lee [7]. We adapt various models available in the literature concerning authenticity, unforgeability and non-repudiation and propose a signature non-repudiation model suitable for signcryption schemes with proxy re-encryption. We show the non-repudiability of our scheme in this model. We also introduce and define a new security notion of Weak-IND-CCA2, a slightly weakened adaptation of the IND-CCA2 security model for signcryption schemes and prove that RSA-TBOS-PRE is secure in this model. Our scheme is Weak-IND-CCA2 secure, unidirectional, extensible to multi-use and does not use bilinear maps. This represents significant progress towards solving the open problem of designing an IND-CCA2 secure, unidirectional, multi-use scheme not using bilinear maps proposed in [15][12].
最近对苹果iTunes数字版权管理的攻击[17]揭示了代理重新加密方案对数字版权管理的有用性。众所周知,使用代理重新加密可以阻止[17]中的攻击。考虑到这个实用程序和不可抵赖性的附加要求,我们提出了有史以来第一个不涉及双线性映射的代理重新加密的签名加密方案。我们借鉴了文献中关于真实性、不可伪造性和不可否认性的各种模型,提出了一个适用于具有代理再加密的签名加密方案的签名不可否认模型。我们在这个模型中证明了我们的方案的不可否认性。我们还引入并定义了一个新的安全概念- Weak-IND-CCA2,这是对签名加密方案中IND-CCA2安全模型的略微弱化的适应,并证明了RSA-TBOS-PRE在该模型中是安全的。我们的方案是弱- ind - cca2安全,单向,可扩展的多用途,不使用双线性映射。这代表了在解决未使用[15][12]中提出的双线性映射的IND-CCA2安全、单向、多用途方案设计的开放性问题方面取得的重大进展。
{"title":"RSA-TBOS signcryption with proxy re-encryption","authors":"Varad Kirtane, Pandu Rangan","doi":"10.1145/1456520.1456531","DOIUrl":"https://doi.org/10.1145/1456520.1456531","url":null,"abstract":"The recent attack on Apple iTunes Digital Rights Management [17] has brought to light the usefulness of proxy re-encryption schemes for Digital Rights Management. It is known that the use of proxy re-encryption would have prevented the attack in [17]. With this utility in mind and with the added requirement of non-repudiation, we propose the first ever signcryption scheme with proxy re-encryption that does not involve bilinear maps. Our scheme is called RSA-TBOS-PRE and is based on the RSA-TBOS signcryption scheme of Mao and Malone-Lee [7]. We adapt various models available in the literature concerning authenticity, unforgeability and non-repudiation and propose a signature non-repudiation model suitable for signcryption schemes with proxy re-encryption. We show the non-repudiability of our scheme in this model. We also introduce and define a new security notion of Weak-IND-CCA2, a slightly weakened adaptation of the IND-CCA2 security model for signcryption schemes and prove that RSA-TBOS-PRE is secure in this model. Our scheme is Weak-IND-CCA2 secure, unidirectional, extensible to multi-use and does not use bilinear maps. This represents significant progress towards solving the open problem of designing an IND-CCA2 secure, unidirectional, multi-use scheme not using bilinear maps proposed in [15][12].","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116876028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
A formal conceptual model for rights 权利的正式概念模型
Pub Date : 2008-10-27 DOI: 10.1145/1456520.1456528
Pramod A. Jamkhedkar, G. Heileman
Emergence of different digital rights management (DRM) systems and various rights expression languages (RELs) has led to problems with DRM interoperability and smooth flow of content across different content management systems. The complexity, varied scope, undefined boundaries, and lack of formalism in current RELs pose some of the biggest challenges in addressing DRM interoperability. In this paper, we define a formal language neutral conceptual model for rights expression statements that provides a platform upon which rights statements from different RELs can be mapped, reasoned, and manipulated.
不同的数字版权管理(DRM)系统和不同的版权表达语言(rel)的出现导致了数字版权管理(DRM)互操作性和内容在不同内容管理系统之间顺畅流动的问题。当前rel中的复杂性、不同的范围、未定义的边界和缺乏形式化构成了解决DRM互操作性的一些最大挑战。在本文中,我们为权利表达语句定义了一个形式语言中立的概念模型,该模型提供了一个平台,在该平台上可以映射、推理和操作来自不同rel的权利语句。
{"title":"A formal conceptual model for rights","authors":"Pramod A. Jamkhedkar, G. Heileman","doi":"10.1145/1456520.1456528","DOIUrl":"https://doi.org/10.1145/1456520.1456528","url":null,"abstract":"Emergence of different digital rights management (DRM) systems and various rights expression languages (RELs) has led to problems with DRM interoperability and smooth flow of content across different content management systems. The complexity, varied scope, undefined boundaries, and lack of formalism in current RELs pose some of the biggest challenges in addressing DRM interoperability. In this paper, we define a formal language neutral conceptual model for rights expression statements that provides a platform upon which rights statements from different RELs can be mapped, reasoned, and manipulated.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124986517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Content identification 内容识别
Pub Date : 2008-10-27 DOI: 10.1145/1456520.1456521
Y. Yacobi
Content identification can help link content to its legal creators. How robust can content identification become? In part-I of the talk we speculate about its asymptotic computational complexity (joint with Kivanc M. Mihcak), and in part-II we discuss the economics of such systems (joint with Gideon Yaniv; see full paper in this proceeding).
内容识别可以帮助将内容链接到其合法创作者。内容识别可以变得多健壮?在演讲的第一部分中,我们推测了它的渐近计算复杂性(与Kivanc M. Mihcak联合),在第二部分中,我们讨论了这种系统的经济学(与Gideon Yaniv;请参阅本文全文)。
{"title":"Content identification","authors":"Y. Yacobi","doi":"10.1145/1456520.1456521","DOIUrl":"https://doi.org/10.1145/1456520.1456521","url":null,"abstract":"Content identification can help link content to its legal creators. How robust can content identification become? In part-I of the talk we speculate about its asymptotic computational complexity (joint with Kivanc M. Mihcak), and in part-II we discuss the economics of such systems (joint with Gideon Yaniv; see full paper in this proceeding).","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126257236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mechanism for software tamper resistance: an application of white-box cryptography 软件防篡改机制:白盒密码学的应用
Pub Date : 2007-10-29 DOI: 10.1145/1314276.1314291
Wil Michiels, Paul Gorissen
In software protection we typically have to deal with the white-box attack model. In this model an attacker is assumed to have full access to the software and full control over its execution. The goal of white-box cryptography is to implement cryptographic algorithms in software such that it is hard for an attacker to extract the key by a white-box attack. Chow et al. present white-box implementations for AES and DES. Based on their ideas, white-box implementations can be derived for other block ciphers as well. In the white-box implementations the key of the underlying block cipher is expanded from several bytes to a collection of lookup tables with a total size in the order of hundreds of kilobytes. In this paper we present a technique that uses a white-box implementation to make software tamper resistant. The technique interprets the binary of software code as lookup tables, which are next incorporated into the collection of lookup tables of a white-box implementation. This makes the code tamper resistant as the dual interpretation implies that a change in the code results in an unintentional change in the white-box implementation. We also indicate in the paper that it is difficult for an attacker to make modifications to the white-box implementation such that its original operation is restored.
在软件保护中,我们通常必须处理白盒攻击模型。在这个模型中,攻击者被假定拥有对软件的完全访问权限和对其执行的完全控制。白盒密码学的目标是在软件中实现加密算法,使攻击者难以通过白盒攻击提取密钥。Chow等人提出了AES和DES的白盒实现。基于他们的想法,也可以衍生出其他分组密码的白盒实现。在白盒实现中,底层分组密码的密钥从几个字节扩展到查找表的集合,其总大小约为数百千字节。在本文中,我们提出了一种使用白盒实现使软件抗篡改的技术。该技术将软件代码的二进制解释为查找表,然后将其合并到白盒实现的查找表集合中。这使得代码具有抗篡改性,因为双重解释意味着代码中的更改会导致白盒实现中的无意更改。我们还在论文中指出,攻击者很难修改白盒实现以恢复其原始操作。
{"title":"Mechanism for software tamper resistance: an application of white-box cryptography","authors":"Wil Michiels, Paul Gorissen","doi":"10.1145/1314276.1314291","DOIUrl":"https://doi.org/10.1145/1314276.1314291","url":null,"abstract":"In software protection we typically have to deal with the white-box attack model. In this model an attacker is assumed to have full access to the software and full control over its execution. The goal of white-box cryptography is to implement cryptographic algorithms in software such that it is hard for an attacker to extract the key by a white-box attack. Chow et al. present white-box implementations for AES and DES. Based on their ideas, white-box implementations can be derived for other block ciphers as well. In the white-box implementations the key of the underlying block cipher is expanded from several bytes to a collection of lookup tables with a total size in the order of hundreds of kilobytes. In this paper we present a technique that uses a white-box implementation to make software tamper resistant. The technique interprets the binary of software code as lookup tables, which are next incorporated into the collection of lookup tables of a white-box implementation. This makes the code tamper resistant as the dual interpretation implies that a change in the code results in an unintentional change in the white-box implementation. We also indicate in the paper that it is difficult for an attacker to make modifications to the white-box implementation such that its original operation is restored.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117263989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
Digital rights management: desirable, inevitable, and almost irrelevant 数字版权管理:可取的、不可避免的、几乎无关紧要的
Pub Date : 2007-10-29 DOI: 10.1145/1314276.1314277
A. Odlyzko
The title of this presentation is a slight modification of that of an earlier lecture on a closely related topic [5]. It reflects a slight exaggeration, but only a slight one, of the general thesis that Digital Rights Management (DRM) technologies will continue to play only a modest role in the future of ecommerce. DRM is attractive for several related reasons. Content providers feel they can get more control over their wares. Such control is comforting in general, and could enable new methods of charging, which might provide greater revenues. More generally, the Internet is enabling sellers to find out much more about buyers’ ability and willingness to pay, and also (through DRM and other techniques) is providing sellers with tools to control usage (and thus prevent arbitrage), leading to unprecedented opportunities and incentives for price discrimination [8, 9]. Thus it should not be surprising that extensive efforts have gone into research, development, and deployment of DRM. Yet the record of DRM so far is not too inspiring. And it has been uninspiring from the very beginning. It has been argued that the concentration on a pervasive form of DRM was one of the main flaws that hindered Ted Nelson’s Project Xanadu, the first hypertext system. And a rising chorus of voices (including Steve Jobs of Apple) is urging the content industry to give up or at least relax its insistence on DRM. The lecture summarized here will review the arguments of DRM skeptics. This abstract provides a very brief overview of some of the main points. References are given to my papers, where those points are explained in more detail, and citations are provided to the extensive literature on the subject.
这次演讲的题目是对之前一个密切相关的主题[5]的演讲题目的轻微修改。数字版权管理(DRM)技术将在未来的电子商务中继续扮演适度的角色,这反映了一种略微夸张的观点,但只是轻微的夸张。DRM有几个相关的原因。内容提供商认为他们可以更好地控制自己的产品。总的来说,这样的控制是令人欣慰的,并且可以实现新的收费方式,这可能会带来更大的收入。更一般地说,互联网使卖方能够更多地了解买方的支付能力和意愿,并且(通过DRM和其他技术)为卖方提供了控制使用(从而防止套利)的工具,从而导致了前所未有的价格歧视机会和激励[8,9]。因此,在DRM的研究、开发和部署方面投入了大量的努力,这并不奇怪。然而,到目前为止,数字版权管理的记录并不太鼓舞人心。而且从一开始就没有什么鼓舞人心的。有人认为,集中于普遍形式的DRM是阻碍Ted Nelson的Project Xanadu(第一个超文本系统)的主要缺陷之一。越来越多的人(包括苹果公司的史蒂夫•乔布斯)呼吁内容产业放弃或至少放松对数字版权管理的坚持。这里总结的讲座将回顾DRM怀疑论者的论点。这份摘要提供了一些要点的简要概述。我的论文中有参考文献,这些观点得到了更详细的解释,并提供了有关该主题的大量文献的引用。
{"title":"Digital rights management: desirable, inevitable, and almost irrelevant","authors":"A. Odlyzko","doi":"10.1145/1314276.1314277","DOIUrl":"https://doi.org/10.1145/1314276.1314277","url":null,"abstract":"The title of this presentation is a slight modification of that of an earlier lecture on a closely related topic [5]. It reflects a slight exaggeration, but only a slight one, of the general thesis that Digital Rights Management (DRM) technologies will continue to play only a modest role in the future of ecommerce. DRM is attractive for several related reasons. Content providers feel they can get more control over their wares. Such control is comforting in general, and could enable new methods of charging, which might provide greater revenues. More generally, the Internet is enabling sellers to find out much more about buyers’ ability and willingness to pay, and also (through DRM and other techniques) is providing sellers with tools to control usage (and thus prevent arbitrage), leading to unprecedented opportunities and incentives for price discrimination [8, 9]. Thus it should not be surprising that extensive efforts have gone into research, development, and deployment of DRM. Yet the record of DRM so far is not too inspiring. And it has been uninspiring from the very beginning. It has been argued that the concentration on a pervasive form of DRM was one of the main flaws that hindered Ted Nelson’s Project Xanadu, the first hypertext system. And a rising chorus of voices (including Steve Jobs of Apple) is urging the content industry to give up or at least relax its insistence on DRM. The lecture summarized here will review the arguments of DRM skeptics. This abstract provides a very brief overview of some of the main points. References are given to my papers, where those points are explained in more detail, and citations are provided to the extensive literature on the subject.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"185 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114749046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
ACM Digital Rights Management Workshop
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1