...
首页> 外文期刊>International Journal of Information Security >Toward tracing and revoking schemes secure against collusion and any form of secret information leakage
【24h】

Toward tracing and revoking schemes secure against collusion and any form of secret information leakage

机译:跟踪和吊销方案可以防止串通和任何形式的秘密信息泄漏

获取原文
获取原文并翻译 | 示例

摘要

Tracing and revoking schemes enable a center to deliver protected content to a subset of privileged users of a given universe. The main property these schemes enjoy is that traitors, who illegally help unauthorized users to set up a pirate decoder for gaining access to the protected content, can be identified and removed from the privileged subset. Historically, traitors have been modeled as users who privately share their secret information with unauthorized users. However, in the Pirates 2.0 attack model, traitors collaborate in public and partially share their secret information with a certified guarantee of anonymity. Several classes of tracing and revoking schemes, like tree-based tracing and revoking schemes and code-based tracing schemes, are subject to such a new threat. In this paper we propose methods to cope with the Pirates 2.0 attack. We focus our attention on the class of tree-based schemes. We start by discussing some simple techniques, which can partially help to deal with the attack, and point out their limits. Then, looking through the literature, we recover some ideas, which can be used to strengthen tracing and revoking schemes. We also analyze the trade-off which can be obtained by applying these ideas to the schemes. Finally, we describe new hybrid schemes, obtained by mixing previous constructions, which can be used to face up the Pirates 2.0 attack.
机译:跟踪和吊销方案使中心可以将受保护的内容交付给给定Universe的一部分特权用户。这些方案所具有的主要特性是,可以识别出叛徒,他们可以非法地帮助未经授权的用户设置盗版解码器以获取对受保护内容的访问权,并可以将其从特权子集中删除。从历史上看,叛徒被建模为与未授权用户私下共享其秘密信息的用户。但是,在Pirates 2.0攻击模型中,叛徒在公开场合进行协作,并通过认证的匿名保证部分共享其秘密信息。几类跟踪和吊销方案,例如基于树的跟踪和吊销方案以及基于代码的跟踪方案,都面临这种新威胁。在本文中,我们提出了应对海盗2.0攻击的方法。我们将注意力集中在基于树的方案的类上。我们首先讨论一些简单的技术,这些技术可以部分帮助应对攻击,并指出其局限性。然后,通过查阅文献,我们可以找到一些想法,这些想法可以用来加强跟踪和吊销计划。我们还分析了可以通过将这些思想应用于方案而获得的权衡。最后,我们描述了通过混合以前的构造而获得的新混合方案,这些方案可以用来对抗海盗2.0攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号