首页 > 最新文献

ACM Digital Rights Management Workshop最新文献

英文 中文
Analysis of an incentives-based secrets protection system 基于激励的秘密保护制度分析
Pub Date : 2004-10-25 DOI: 10.1145/1029146.1029153
N. B. Margolin, M. Wright, B. Levine
Once electronic content has been released it is very difficult to prevent copies of the content from being widely distributed. Such distribution can cause economic harm to the content's copyright owner and others. Our protocol, SPIES, allows one party to sell a secret to second party and provides an economic incentive for two parties to limit sharing of a secret between themselves. We do not use watermarking or traditional DRM mechanisms. We focus on content which is to be shared between two parties only, which is valuable, and which only needs to be protected for a limited amount of time. Examples include passwords to a subscription service, pre-release of media for review, or content shared but bound by a non disclosure agreement. With SPIES, any possesor of the content can receive a portion of the funds placed in escrow by the two legitimate possesors. We analyze this system and show that the best strategy of the content provider and content consumer to maximize their utility is to use SPIES and not share the content further. We deal successfully with a "dummy registration" attack in which multiple false identities are used in an attempt to get a higher payment. We also discuss how to determine the correct escrow amount.
一旦电子内容被发布,就很难阻止内容的副本被广泛传播。这样的分发会对内容的版权所有者和其他人造成经济损失。我们的协议,SPIES,允许一方向另一方出售秘密,并为双方提供经济激励,以限制他们之间的秘密共享。我们不使用水印或传统的DRM机制。我们专注于只在双方之间共享的内容,这些内容是有价值的,并且只需要在有限的时间内受到保护。示例包括订阅服务的密码、用于审查的媒体的预发布,或受保密协议约束的共享内容。使用SPIES,内容的任何所有者都可以收到由两个合法所有者托管的资金的一部分。通过对该系统的分析,我们发现内容提供者和内容消费者最大化其效用的最佳策略是使用SPIES,而不是进一步共享内容。我们成功地处理了“虚拟注册”攻击,其中使用多个虚假身份试图获得更高的付款。我们还讨论了如何确定正确的托管金额。
{"title":"Analysis of an incentives-based secrets protection system","authors":"N. B. Margolin, M. Wright, B. Levine","doi":"10.1145/1029146.1029153","DOIUrl":"https://doi.org/10.1145/1029146.1029153","url":null,"abstract":"Once electronic content has been released it is very difficult to prevent copies of the content from being widely distributed. Such distribution can cause economic harm to the content's copyright owner and others. Our protocol, SPIES, allows one party to sell a secret to second party and provides an economic incentive for two parties to limit sharing of a secret between themselves. We do not use watermarking or traditional DRM mechanisms. We focus on content which is to be shared between two parties only, which is valuable, and which only needs to be protected for a limited amount of time. Examples include passwords to a subscription service, pre-release of media for review, or content shared but bound by a non disclosure agreement. With SPIES, any possesor of the content can receive a portion of the funds placed in escrow by the two legitimate possesors. We analyze this system and show that the best strategy of the content provider and content consumer to maximize their utility is to use SPIES and not share the content further. We deal successfully with a \"dummy registration\" attack in which multiple false identities are used in an attempt to get a higher payment. We also discuss how to determine the correct escrow amount.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115733241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Traitor tracing for prerecorded and recordable media 为预先录制的和可记录的媒体追踪叛徒
Pub Date : 2004-10-25 DOI: 10.1145/1029146.1029160
Hongxia Jin, J. Lotspiech, Stefan Nusser
In this paper we are focusing on the use of a traitor tracing scheme for distribution models that are based on prerecorded or recordable physical media. When a pirated copy of the protected content is observed, the traitor tracing scheme allows the identification of at least one of the real subscribers who participated in the construction of the pirated copy. We show how we systematically assign the variations to users. We explore under what circumstances traitor tracing technology is applicable for media based distribution and then focus on two challenges specifically related to this form of distribution: We demonstrate a way to encode the variations on the disc that is mostly hidden from the attackers and also remarkably compatible with the existing DVD standard. We also present an efficient key management scheme to significantly reduce the requirement for non-volatile key storage on low-cost CE devices.
在本文中,我们关注的是基于预先录制或可记录的物理介质的分布模型的叛徒跟踪方案的使用。当观察到受保护内容的盗版时,叛徒追踪方案允许识别至少一个参与盗版构建的真实订阅者。我们展示了如何系统地将这些变化分配给用户。我们将探讨在什么情况下叛徒追踪技术适用于基于媒体的发行,然后将重点放在与这种形式的发行特别相关的两个挑战上:我们演示了一种对光盘上的变化进行编码的方法,这种方法对攻击者来说是隐藏的,并且与现有的DVD标准非常兼容。我们还提出了一种有效的密钥管理方案,以显着降低低成本CE设备对非易失性密钥存储的需求。
{"title":"Traitor tracing for prerecorded and recordable media","authors":"Hongxia Jin, J. Lotspiech, Stefan Nusser","doi":"10.1145/1029146.1029160","DOIUrl":"https://doi.org/10.1145/1029146.1029160","url":null,"abstract":"In this paper we are focusing on the use of a traitor tracing scheme for distribution models that are based on prerecorded or recordable physical media. When a pirated copy of the protected content is observed, the traitor tracing scheme allows the identification of at least one of the real subscribers who participated in the construction of the pirated copy. We show how we systematically assign the variations to users. We explore under what circumstances traitor tracing technology is applicable for media based distribution and then focus on two challenges specifically related to this form of distribution: We demonstrate a way to encode the variations on the disc that is mostly hidden from the attackers and also remarkably compatible with the existing DVD standard. We also present an efficient key management scheme to significantly reduce the requirement for non-volatile key storage on low-cost CE devices.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117066792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 48
Display-only file server: a solution against information theft due to insider attack 仅显示文件服务器:防止内部攻击导致信息被盗的解决方案
Pub Date : 2004-10-25 DOI: 10.1145/1029146.1029154
Yang Yu, T. Chiueh
Insider attack is one of the most serious cybersecurity threats to corporate America. Among all insider threats, information theft is considered the most damaging in terms of potential financial loss. Moreover, it is also especially difficult to detect and prevent, because in many cases the attacker has the proper authority to access the stolen information. According to the 2003 CSI/FBI Computer Crime and Security Survey, theft of proprietary information was the single largest category of losses in the 2003 survey totaling $70.1 million or 35% of the total financial loss reported in that survey. In this paper, we describe the design, implementation and evaluation of an industrial-strength solution called Display-Only File Server (DOFS), which can transparently and effectively stop information theft by insiders in most cases, even if the insiders have proper authorities to read/write the protected information. The DOFS architecture ensures that bits of a protected file never leave a DOFS server after the file is checked in and users can still interact with the protected files in the same way as if it is stored locally. Essentially, DOFS decouples "display access" from other types of accesses to a protected file by providing users only the "display image" rather than the bits of the files, and applies the thin-client computing model on existing client-server applications.
内部攻击是美国企业面临的最严重的网络安全威胁之一。在所有内部威胁中,信息盗窃被认为是最具破坏性的潜在经济损失。此外,它也特别难以检测和预防,因为在许多情况下,攻击者拥有访问被盗信息的适当权限。根据2003年CSI/FBI计算机犯罪和安全调查,盗窃专有信息是2003年调查中最大的损失类别,总计7,010万美元,占该调查中报告的总经济损失的35%。在本文中,我们描述了一种称为显示文件服务器(DOFS)的工业强度解决方案的设计,实现和评估,该解决方案可以在大多数情况下透明有效地阻止内部人员窃取信息,即使内部人员拥有适当的权限来读取/写入受保护的信息。DOFS架构确保在文件签入后,受保护文件的位不会离开DOFS服务器,并且用户仍然可以以与本地存储相同的方式与受保护的文件进行交互。从本质上讲,dfs通过仅向用户提供“显示图像”而不是文件的位,将“显示访问”与对受保护文件的其他类型访问分离开来,并在现有的客户机-服务器应用程序上应用瘦客户机计算模型。
{"title":"Display-only file server: a solution against information theft due to insider attack","authors":"Yang Yu, T. Chiueh","doi":"10.1145/1029146.1029154","DOIUrl":"https://doi.org/10.1145/1029146.1029154","url":null,"abstract":"Insider attack is one of the most serious cybersecurity threats to corporate America. Among all insider threats, information theft is considered the most damaging in terms of potential financial loss. Moreover, it is also especially difficult to detect and prevent, because in many cases the attacker has the proper authority to access the stolen information. According to the 2003 CSI/FBI Computer Crime and Security Survey, theft of proprietary information was the single largest category of losses in the 2003 survey totaling $70.1 million or 35% of the total financial loss reported in that survey. In this paper, we describe the design, implementation and evaluation of an industrial-strength solution called <i>Display-Only File Server</i> (DOFS), which can transparently and effectively stop information theft by insiders in most cases, even if the insiders have proper authorities to read/write the protected information. The DOFS architecture ensures that bits of a protected file never leave a DOFS server after the file is checked in and users can still interact with the protected files in the same way as if it is stored locally. Essentially, DOFS decouples \"display access\" from other types of accesses to a protected file by providing users only the \"display image\" rather than the bits of the files, and applies the thin-client computing model on existing client-server applications.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"45 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131295714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Tracing traitors: a selective survey 追踪叛徒:选择性调查
Pub Date : 2004-10-25 DOI: 10.1145/1029146.1029148
R. Safavi-Naini
Digital media provide higher portability, storage and communication efficiency, and accuracy of data. However digital objects can be easily and accurately copied. This allows unauthorized reproduction and distribution of copyrighted objects, hence bypassing the ownership and intellectual property rights of owners, creators and distributors of the object. Protection of media data such as movies, music and multimedia data against illegal copying and re-distribution has been one of the greatest challenges of digital content distribution. Protection becomes exceedingly hard if a group of users combine their privileges to overcome the protection mechanism of the system. A range of techniques have been proposed to "mark" the content, or the player of the content, so that pirate digital objects, or the illegal player, can be traced and at least one of the colluders be identified. We review a range of techniques and constructions that have been proposed in recent years and used in applications such as pay-TV, digital broadcasting and content distribution systems, as well as digital storage systems such as compact disks. We will point out limitations of existing methods and discuss challenges and directions for future research.
数字媒体提供了更高的便携性、存储和通信效率以及数据的准确性。然而,数字对象可以很容易和准确地复制。这允许未经授权的复制和分发受版权保护的对象,从而绕过了对象的所有者、创作者和分发者的所有权和知识产权。保护媒体数据,如电影、音乐和多媒体数据,防止非法复制和再分发,一直是数字内容分发的最大挑战之一。如果一组用户结合他们的特权来克服系统的保护机制,保护就会变得非常困难。人们提出了一系列技术来“标记”内容或内容的玩家,这样就可以追踪盗版数字对象或非法玩家,并至少识别出其中一个共谋者。我们回顾了近年来提出的一系列技术和结构,并在诸如付费电视、数字广播和内容分发系统以及数字存储系统(如光盘)等应用中使用。我们将指出现有方法的局限性,并讨论未来研究的挑战和方向。
{"title":"Tracing traitors: a selective survey","authors":"R. Safavi-Naini","doi":"10.1145/1029146.1029148","DOIUrl":"https://doi.org/10.1145/1029146.1029148","url":null,"abstract":"Digital media provide higher portability, storage and communication efficiency, and accuracy of data. However digital objects can be easily and accurately copied. This allows unauthorized reproduction and distribution of copyrighted objects, hence bypassing the ownership and intellectual property rights of owners, creators and distributors of the object. Protection of media data such as movies, music and multimedia data against illegal copying and re-distribution has been one of the greatest challenges of digital content distribution. Protection becomes exceedingly hard if a group of users combine their privileges to overcome the protection mechanism of the system. A range of techniques have been proposed to \"mark\" the content, or the player of the content, so that pirate digital objects, or the illegal player, can be traced and at least one of the colluders be identified.\u0000 We review a range of techniques and constructions that have been proposed in recent years and used in applications such as pay-TV, digital broadcasting and content distribution systems, as well as digital storage systems such as compact disks. We will point out limitations of existing methods and discuss challenges and directions for future research.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125202142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Import/export in digital rights management 数字版权管理的导入/导出
Pub Date : 2004-10-25 DOI: 10.1145/1029146.1029163
R. Safavi-Naini, N. Sheppard, T. Uehara
The inherently controlled nature of digital rights management systems does little to promote inter-operability of systems provided by different vendors. In this paper, we consider import and export functionality by which multimedia protected by one digital rights management regime can be made available to a multimedia device that supports a different digital rights management regime, without compromising the protection afforded to the content under the original regime. We first identify specific issues to be addressed by developers of digital rights management import/export regimes and outline a variety of methods by which these regimes may be implemented. We then apply our observations to the specific example of import and export of content between the digital rights management regimes defined by the Motion Picture Exports Group and the Open Mobile Alliance.
数字版权管理系统固有的受控性质对促进不同供应商提供的系统的互操作性几乎没有帮助。在本文中,我们考虑了导入和导出功能,通过该功能,受一种数字版权管理制度保护的多媒体可以提供给支持不同数字版权管理制度的多媒体设备,而不会损害原始制度下对内容的保护。我们首先确定了数字版权管理进出口制度的开发者需要解决的具体问题,并概述了实施这些制度的各种方法。然后,我们将我们的观察结果应用于由电影出口集团和开放移动联盟定义的数字版权管理制度之间的内容进出口的具体示例。
{"title":"Import/export in digital rights management","authors":"R. Safavi-Naini, N. Sheppard, T. Uehara","doi":"10.1145/1029146.1029163","DOIUrl":"https://doi.org/10.1145/1029146.1029163","url":null,"abstract":"The inherently controlled nature of digital rights management systems does little to promote inter-operability of systems provided by different vendors. In this paper, we consider import and export functionality by which multimedia protected by one digital rights management regime can be made available to a multimedia device that supports a different digital rights management regime, without compromising the protection afforded to the content under the original regime. We first identify specific issues to be addressed by developers of digital rights management import/export regimes and outline a variety of methods by which these regimes may be implemented. We then apply our observations to the specific example of import and export of content between the digital rights management regimes defined by the Motion Picture Exports Group and the Open Mobile Alliance.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126551720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 50
DRM as a layered system DRM是一个分层的系统
Pub Date : 2004-10-25 DOI: 10.1145/1029146.1029151
Pramod A. Jamkhedkar, G. Heileman
The current landscape for digital rights management(DRM) consists of various ad hoc technologies and platforms that largely focus on copy protection. The fragmented nature of the DRM industry in 2004 is somewhat reminiscent of the telecommunications industry in the late 1980's. At that time various networking technologies were available, and what was needed was a technology that could integrate existing networks and provide various services to users. The OSI layered framework and the TCP/IP communications protocol suite provided a solution to this situation. The OSI model divides the process of digital data communications into layers. Likewise, in this paper we divide the process of DRM into layers in which various services are offered to the users of digital content at each layer. Three blocks of layers have been identified. The upper layers deal with the end-to-end functions of the application, the middle layers deal with rights expression and interpretation, and the lower layers ensure rights enforcement. This paper describes how responsibilities might be distributed among the various layers, and considers where in these layers it would be appropriate to define protocols and standards.
数字版权管理(DRM)的当前格局由各种专门的技术和平台组成,这些技术和平台主要侧重于拷贝保护。2004年DRM行业的碎片化本质多少让人想起了20世纪80年代末的电信行业。当时有各种各样的网络技术,需要的是一种能够整合现有网络并为用户提供各种服务的技术。OSI分层框架和TCP/IP通信协议组为这种情况提供了解决方案。OSI模型将数字数据通信的过程分为几层。同样,在本文中,我们将DRM的过程划分为几层,每一层为数字内容的用户提供各种服务。已经确定了三个层块。上层处理应用程序的端到端功能,中间层处理权利的表达和解释,下层确保权利的实施。本文描述了责任如何在各个层之间分配,并考虑了在这些层的哪些地方定义协议和标准是合适的。
{"title":"DRM as a layered system","authors":"Pramod A. Jamkhedkar, G. Heileman","doi":"10.1145/1029146.1029151","DOIUrl":"https://doi.org/10.1145/1029146.1029151","url":null,"abstract":"The current landscape for digital rights management(DRM) consists of various ad hoc technologies and platforms that largely focus on copy protection. The fragmented nature of the DRM industry in 2004 is somewhat reminiscent of the telecommunications industry in the late 1980's. At that time various networking technologies were available, and what was needed was a technology that could integrate existing networks and provide various services to users. The OSI layered framework and the TCP/IP communications protocol suite provided a solution to this situation. The OSI model divides the process of digital data communications into layers. Likewise, in this paper we divide the process of DRM into layers in which various services are offered to the users of digital content at each layer. Three blocks of layers have been identified. The upper layers deal with the end-to-end functions of the application, the middle layers deal with rights expression and interpretation, and the lower layers ensure rights enforcement. This paper describes how responsibilities might be distributed among the various layers, and considers where in these layers it would be appropriate to define protocols and standards.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125528967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 56
The Present and Future of DRM - Musings on Emerging Legal Problems 数字版权管理的现在与未来——对新出现的法律问题的思考
Pub Date : 2003-12-08 DOI: 10.1007/10941270_36
S. Bechtold
{"title":"The Present and Future of DRM - Musings on Emerging Legal Problems","authors":"S. Bechtold","doi":"10.1007/10941270_36","DOIUrl":"https://doi.org/10.1007/10941270_36","url":null,"abstract":"","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128014152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
How DRM-based content delivery systems disrupt expectations of "personal use" 基于drm的内容交付系统如何破坏“个人使用”的预期
Pub Date : 2003-10-27 DOI: 10.1145/947380.947391
D. Mulligan, John Han, A. Burstein
We set out to examine whether current, DRM-based online offerings of music and movies accord with consumers' current expectations regarding the personal use of copyrighted works by studying the behavior of six music, and two film online distribution services. We find that, for the most part, the services examined do not accord with expectations of personal use. The DRM-based services studied restrict personal use in a manner inconsistent with the norms and expectations governing the purchase and rental of traditional physical CDs, DVDs, and videocassettes. If adopted by consumers the DRM systems stand to alter the norms governing personal use of copyrighted content and create pitfalls of legal liability for unsuspecting consumers. In conclusion, we present technological and legal considerations which may help current and future DRM system designers better accommodate consumers' expectations of personal use.
通过研究六种音乐和两种电影在线发行服务的行为,我们开始研究当前基于数字版权管理的在线音乐和电影产品是否符合消费者当前对个人使用受版权保护作品的期望。我们发现,在大多数情况下,所审查的服务不符合个人使用的期望。所研究的基于drm的服务限制了个人使用,其方式与管理购买和租赁传统实体cd、dvd和录像带的规范和期望不一致。如果消费者采用DRM系统,将改变管理个人使用受版权保护内容的规范,并为毫无戒心的消费者制造法律责任陷阱。总之,我们提出了技术和法律方面的考虑,这些考虑可能有助于当前和未来的DRM系统设计者更好地适应消费者对个人使用的期望。
{"title":"How DRM-based content delivery systems disrupt expectations of \"personal use\"","authors":"D. Mulligan, John Han, A. Burstein","doi":"10.1145/947380.947391","DOIUrl":"https://doi.org/10.1145/947380.947391","url":null,"abstract":"We set out to examine whether current, DRM-based online offerings of music and movies accord with consumers' current expectations regarding the personal use of copyrighted works by studying the behavior of six music, and two film online distribution services. We find that, for the most part, the services examined do not accord with expectations of personal use. The DRM-based services studied restrict personal use in a manner inconsistent with the norms and expectations governing the purchase and rental of traditional physical CDs, DVDs, and videocassettes. If adopted by consumers the DRM systems stand to alter the norms governing personal use of copyrighted content and create pitfalls of legal liability for unsuspecting consumers. In conclusion, we present technological and legal considerations which may help current and future DRM system designers better accommodate consumers' expectations of personal use.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125885898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 101
New traitor tracing schemes using bilinear map 利用双线性映射的叛徒追踪新方案
Pub Date : 2003-10-27 DOI: 10.1145/947380.947389
Vu Dong Tô, R. Safavi-Naini, Fangguo Zhang
Mitsunari et al [15] presented a new traitor tracing scheme which uses Weil pairing in elliptic curves. To the best of our knowledge this is the first scheme that uses bilinear map. The claimed advantage of the scheme is that the ciphertext size is independent of the number of traitors. It is shown that the problem of constructing a pirate key by k colluders is as hard as the so-called "k-weak Diffie-Hellman problem".In this paper, we show an attack on this scheme in which traitors find a linear combination of their keys to construct a pirate key that can be used to decrypt the ciphertext. We identify a class of schemes, that includes MSK, with the property that correct tracing requires the ciphertext size to depend on the collusion threshold. We derive a lower bound on the size of the ciphertext that depends on the number of colluders.We propose a modification to MSK scheme, Scheme 1, which not only ensures constructing a pirate decoder is hard, but also has a number of significant advantages over the initial proposal. In particular, it is a public key traitor tracing scheme while the original scheme is a secret key traitor tracing scheme; it has a black box tracing algorithm while MSK scheme only has an open box tracing algorithm, and finally its security is provable (semantic secure against passive adversary) while there was no security proof for MSK.We also propose two other schemes based on bilinear pairing. Scheme~2, is a generic scheme and can be used with any linear error correcting code. Scheme~3 uses Shamir's secret sharing scheme and has the added property that the encrypted message can be targeted to a subset of users. This is by including user revocation property and allowing selected users to be revoked from the original set of users. We also give proof of security, similar to Scheme 1, and also a tracing algorithm for the two schemes. Finally we give an efficiency comparison for the three schemes against the most efficient schemes with similar security and traceability properties and show that all three schemes are the most efficient ones of their kind.
Mitsunari等人提出了一种在椭圆曲线上使用Weil配对的叛徒跟踪方案。据我们所知,这是第一个使用双线性映射的方案。该方案声称的优点是密文的大小与叛徒的数量无关。证明了由k个共谋者构造一个盗版密钥的问题与所谓的“k-弱Diffie-Hellman问题”一样困难。在本文中,我们展示了对该方案的攻击,其中叛徒找到他们的密钥的线性组合来构造可用于解密密文的盗版密钥。我们确定了一类方案,其中包括MSK,具有正确跟踪要求密文大小依赖于合谋阈值的特性。我们推导了密文大小的下界,该下界取决于共谋者的数量。我们提出了MSK方案的修改方案1,该方案不仅确保了构建盗版解码器的难度,而且比最初的提议具有许多显着的优势。特别地,它是一个公钥叛逆者跟踪方案,而原方案是一个密钥叛逆者跟踪方案;它有一个黑盒跟踪算法,而MSK方案只有一个开盒跟踪算法,最后它的安全性是可证明的(对被动对手的语义安全),而MSK方案没有安全性证明。我们还提出了另外两种基于双线性配对的方案。方案2是一种通用方案,可用于任何线性纠错码。Scheme~3使用Shamir的秘密共享方案,并增加了加密消息可以针对用户子集的属性。这是通过包括用户撤销属性并允许从原始用户集中撤销选定的用户来实现的。我们还给出了类似方案1的安全性证明,并给出了两个方案的跟踪算法。最后,我们将这三种方案与具有相似安全性和可追溯性的最有效方案进行了效率比较,表明这三种方案都是同类方案中最有效的方案。
{"title":"New traitor tracing schemes using bilinear map","authors":"Vu Dong Tô, R. Safavi-Naini, Fangguo Zhang","doi":"10.1145/947380.947389","DOIUrl":"https://doi.org/10.1145/947380.947389","url":null,"abstract":"Mitsunari et al [15] presented a new traitor tracing scheme which uses Weil pairing in elliptic curves. To the best of our knowledge this is the first scheme that uses bilinear map. The claimed advantage of the scheme is that the ciphertext size is independent of the number of traitors. It is shown that the problem of constructing a pirate key by k colluders is as hard as the so-called \"k-weak Diffie-Hellman problem\".In this paper, we show an attack on this scheme in which traitors find a linear combination of their keys to construct a pirate key that can be used to decrypt the ciphertext. We identify a class of schemes, that includes MSK, with the property that correct tracing requires the ciphertext size to depend on the collusion threshold. We derive a lower bound on the size of the ciphertext that depends on the number of colluders.We propose a modification to MSK scheme, Scheme 1, which not only ensures constructing a pirate decoder is hard, but also has a number of significant advantages over the initial proposal. In particular, it is a public key traitor tracing scheme while the original scheme is a secret key traitor tracing scheme; it has a black box tracing algorithm while MSK scheme only has an open box tracing algorithm, and finally its security is provable (semantic secure against passive adversary) while there was no security proof for MSK.We also propose two other schemes based on bilinear pairing. Scheme~2, is a generic scheme and can be used with any linear error correcting code. Scheme~3 uses Shamir's secret sharing scheme and has the added property that the encrypted message can be targeted to a subset of users. This is by including user revocation property and allowing selected users to be revoked from the original set of users. We also give proof of security, similar to Scheme 1, and also a tracing algorithm for the two schemes. Finally we give an efficiency comparison for the three schemes against the most efficient schemes with similar security and traceability properties and show that all three schemes are the most efficient ones of their kind.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126290056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 45
Obfuscation of design intent in object-oriented applications 面向对象应用程序中设计意图的混淆
Pub Date : 2003-10-27 DOI: 10.1145/947380.947399
Mikhail Sosonkin, G. Naumovich, N. Memon
Protection of digital data from unauthorized access is of paramount importance. In the past several years, much research has concentrated on protecting data from the standpoint of confidentiality, integrity and availability. Software is a form of data with unique properties and its protection poses unique challenges. First, software can be reverse engineered, which may result in stolen intellectual property. Second, software can be altered with the intent of performing operations this software must not be allowed to perform.With commercial software increasingly distributed in forms from which source code can be easily extracted, such as Java bytecodes, reverse engineering has become easier than ever. Obfuscation techniques have been proposed to impede illegal reverse engineers. Obfuscations are program transformations that preserve the program functionality while obscuring the code, thereby protecting the program against reverse engineering. Unfortunately, the existing obfuscation techniques are limited to obscuring variable names, transformations of local control flow, and obscuring expressions using variables of primitive types. In this paper, we propose obfuscations of design of object-oriented programs.We describe three techniques for obfuscation of program design. The class coalescing obfuscation replaces several classes with a single class. The class splitting obfuscation replaces a single class with multiple classes, each responsible for a part of the functionality of the original class. The type hiding obfuscation uses the mechanism of interfaces in Java to obscure the types of objects manipulated by the program. We show the results of our initial experiments with a prototype implementation of these techniques. In particular, we shown that the runtime overheads of these obfuscations tend to be small.
保护数字数据不受未经授权的访问是至关重要的。在过去的几年中,许多研究都集中在从保密性、完整性和可用性的角度保护数据。软件是一种具有独特属性的数据形式,其保护提出了独特的挑战。首先,软件可以逆向工程,这可能导致知识产权被盗。第二,软件可以被修改,目的是执行该软件不允许执行的操作。随着商业软件越来越多地以易于提取源代码的形式分发,例如Java字节码,逆向工程变得比以往任何时候都容易。为了防止非法逆向工程,人们提出了混淆技术。混淆是在模糊代码的同时保留程序功能的程序转换,从而保护程序免受逆向工程的影响。不幸的是,现有的混淆技术仅限于模糊变量名、局部控制流的转换和模糊使用基本类型变量的表达式。在本文中,我们提出了面向对象程序设计的混淆。我们描述了三种混淆程序设计的技术。类合并混淆用单个类替换多个类。类分裂混淆用多个类替换单个类,每个类负责原始类的一部分功能。类型隐藏混淆使用Java中的接口机制来模糊程序操作的对象类型。我们用这些技术的原型实现展示了我们最初的实验结果。特别是,我们展示了这些混淆的运行时开销往往很小。
{"title":"Obfuscation of design intent in object-oriented applications","authors":"Mikhail Sosonkin, G. Naumovich, N. Memon","doi":"10.1145/947380.947399","DOIUrl":"https://doi.org/10.1145/947380.947399","url":null,"abstract":"Protection of digital data from unauthorized access is of paramount importance. In the past several years, much research has concentrated on protecting data from the standpoint of confidentiality, integrity and availability. Software is a form of data with unique properties and its protection poses unique challenges. First, software can be reverse engineered, which may result in stolen intellectual property. Second, software can be altered with the intent of performing operations this software must not be allowed to perform.With commercial software increasingly distributed in forms from which source code can be easily extracted, such as Java bytecodes, reverse engineering has become easier than ever. Obfuscation techniques have been proposed to impede illegal reverse engineers. Obfuscations are program transformations that preserve the program functionality while obscuring the code, thereby protecting the program against reverse engineering. Unfortunately, the existing obfuscation techniques are limited to obscuring variable names, transformations of local control flow, and obscuring expressions using variables of primitive types. In this paper, we propose obfuscations of design of object-oriented programs.We describe three techniques for obfuscation of program design. The class coalescing obfuscation replaces several classes with a single class. The class splitting obfuscation replaces a single class with multiple classes, each responsible for a part of the functionality of the original class. The type hiding obfuscation uses the mechanism of interfaces in Java to obscure the types of objects manipulated by the program. We show the results of our initial experiments with a prototype implementation of these techniques. In particular, we shown that the runtime overheads of these obfuscations tend to be small.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128203749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 60
期刊
ACM Digital Rights Management Workshop
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1