Font Size: a A A

Trace-and-Revoke Schemes Against Pirate Attacks

Posted on:2019-10-24Degree:MasterType:Thesis
Country:ChinaCandidate:S W WenFull Text:PDF
GTID:2428330566994422Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the rapid development of networks and digital technologies,the distribution of digital contents has brought much convenience to our daily life.However,at the same time,copyright protection becomes a critical problem.In order to solve this problem,many scholars have conducted extensive and in-depth research on the traitor tracing techniques.The research results provide both important theoretical and practical value for digital copyright protection fields such as pay-TV,paid music,and online databases.This research mainly focuses on the security and efficiency issue of trace-and-revoke schemes,and systematically describes two variant subset-cover trace-and-revoke schemes that can defend pirate attacks.The subset-cover framework presents two explicit tree-based methods,namely complete subtree(CS)method and subset difference(SD)method,which is employed as the new high definition DVD encryption standard.Pirate attacks,including Pirate Evolution Attacks and Pirates 2.0 Attacks,severely reduce the efficiency of the traitor tracing scheme in the subset-cover framework.Therefore,this paper describes two traitor tracing schemes that can effectively combat pirate attacks.The first one is identity-based trace-and-revoke scheme which upgrades the complete subtree method to defend pirate attacks.The second is a attribute-based trace-and-revoke scheme based on the subset difference method against pirate attacks.The two schemes are fully collusion resilient and support public black-box tracing.
Keywords/Search Tags:Broadcast encryption, traitor tracing, subset-cover, IBE, ABE
PDF Full Text Request
Related items