Fingerprinting & Broadcast Encryption for Content Protection.

Slides:



Advertisements
Similar presentations
Efficient Fingerprinting to Protect Digital Content Josh Benaloh Gideon Yuval Microsoft Research FingerMark Andrew Rosen Microsoft Studios.
Advertisements

Shahzad Basiri Imam Hossein university Workshop on key distribution Tuesday, May 24, 2011 Linear Key Predistribution Scheme.
A Survey of Key Management for Secure Group Communications Celia Li.
Self-Healing in Wireless Networks. The self-healing property is expected in many aspects in wireless networks: – Encryption algorithms – Key distribution.
Group Protocols for Secure Wireless Ad hoc Networks Srikanth Nannapaneni Sreechandu Kamisetty Swethana pagadala Aparna kasturi.
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
White-Box Cryptography
CMSC 414 Computer (and Network) Security Lecture 13 Jonathan Katz.
Presentation By: Garrett Lund Paper By: Sandro Rafaeli and David Hutchison.
II. Linear Block Codes. © Tallal Elshabrawy 2 Last Lecture H Matrix and Calculation of d min Error Detection Capability Error Correction Capability Error.
Traitor Tracing Vijay Ramachandran CS 655: E-commerce Foundations October 10, 2000.
Traitor Tracing Papers Benny Chor, Amos Fiat and Moni Naor, Tracing Traitors (1994) Moni Naor and Benny Pinkas, Threshold Traitor Tracing (1998) Presented.
Broadcast Encryption and Traitor Tracing Jin Kim.
Fingerprinting and Broadcast Encryption Multimedia Security.
N-Secure Fingerprinting for Copyright Protection of Multimedia
Collusion-resistant fingerprinting for multimedia Wade Trappe, Min Wu, K.J. Ray Liu.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Secure Multicast (II) Xun Kang. Content Batch Update of Key Trees Reliable Group Rekeying Tree-based Group Diffie-Hellman Recent progress in Wired and.
Secure Multicast Xun Kang. Content Why need secure Multicast? Secure Group Communications Using Key Graphs Batch Update of Key Trees Reliable Group Rekeying.
Content Protection for Recordable Media Florian Pestoni IBM Almaden Research Center.
Sec final project A Preposition Secret Sharing Scheme for Message Authentication in Broadcast Networks 王怡君.
Scalable Secure Bidirectional Group Communication Yitao Duan and John Canny Berkeley Institute of Design Computer Science.
SE571 Security in Computing
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Cong Wang1, Qian Wang1, Kui Ren1 and Wenjing Lou2
Page 19/4/2015 CSE 30341: Operating Systems Principles Raid storage  Raid – 0: Striping  Good I/O performance if spread across disks (equivalent to n.
Linear Codes.
1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and.
Cryptography and Network Security
A Survey on Secure Cloud Data Storage ZENG, Xi CAI, Peng
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Overlay Network Physical LayerR : router Overlay Layer N R R R R R N.
Cryptography, Authentication and Digital Signatures
Anti-collusion fingerprinting for Multimedia W. Trappe, M. Wu, J. Wang and K.J. R. Liu, IEEE Tran. Signal Processing, Vol. 51, No. 4, April 2003.
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Broadcast Encryption Amos Fiat & Moni Naor Presented.
SOS: Security Overlay Service Angelos D. Keromytis, Vishal Misra, Daniel Rubenstein- Columbia University ACM SIGCOMM 2002 CONFERENCE, PITTSBURGH PA, AUG.
Korea University CRYPTO ‘05 Jung Yeon Hwang, Dong Hoon Lee, Jong In Lim Generic Transformation for Scalable Broadcast Encryption Schemes.
Digital Rights Management and Watermarking of Multimedia Content for M-Commerce Applications Frank Hartung and Friedhelm Ramme, Ericsson Research, IEEE.
Broadcast Encryption Scheme Based on Binary Cubes Alexey Urivskiy JSC «InfoTeCS», Moscow, Russia
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Collusion-Resistant Group Key Management Using Attribute-
Group Rekeying for Filtering False Data in Sensor Networks: A Predistribution and Local Collaboration-Based Approach Wensheng Zhang and Guohong Cao.
Key Mangement Marjan Causevski Sanja Zakovska. Contents Introduction Key Management Improving Key Management End-To-End Scheme Vspace Scheme Conclusion.
Strong Security for Distributed File Systems Group A3 Ka Hou Wong Jahanzeb Faizan Jonathan Sippel.
Cryptography and Network Security (CS435) Part One (Introduction)
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Efficient Key Predistribution for Grid – Based Wireless Sensor Networks.
A secure re-keying scheme Introduction Background Re-keying scheme User revocation User join Conclusion.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED.
14.1/21 Part 5: protection and security Protection mechanisms control access to a system by limiting the types of file access permitted to users. In addition,
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
ADVANTAGE of GENERATOR MATRIX:
Information Theory Linear Block Codes Jalal Al Roumy.
1 Traitor Tracing. 2 Outline  Introduction  State of the art  Traceability scheme  Frameproof code  c-secure code  Combinatorial properties  Tracing.
Computer Science Revocation and Tracing Schemes for Stateless Receivers Dalit Naor, Moni Naor, Jeff Lotspiech Presented by Attila Altay Yavuz CSC 774 In-Class.
J.-H. Cho, I.-R. Chen, M. Eltoweissy ACM/Springer Wireless Networks, 2007 Presented by: Mwaffaq Otoom CS5214 – Spring © 2007 On optimal batch re-keying.
Digital Communications I: Modulation and Coding Course Term Catharina Logothetis Lecture 9.
Weichao Wang, Bharat Bhargava Youngjoo, Shin
Wired Equivalent Privacy (WEP) Chris Overcash. Contents What is WEP? What is WEP? How is it implemented? How is it implemented? Why is it insecure? Why.
Fall 2006CS 395: Computer Security1 Key Management.
A New Approach for Visual Cryptography Wen-Guey Tzeng and Chi-Ming Hu Designs, codes and cryptography, 27, ,2002 Reporter: 李惠龍.
Key Management and Distribution Anand Seetharam CST 312.
Key Generation Protocol in IBC Author : Dhruti Sharma and Devesh Jinwala 論文報告 2015/12/24 董晏彰 1.
Channel Coding: Part I Presentation II Irvanda Kurniadi V. ( ) Digital Communication 1.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Security of Broadcast Networks 1. Overview r Broadcast networks are used mostly for TV r Historical development r Commercial models r One-way or Two-way.
Broadcast Encryption Amos Fiat & Moni Naor Advances in Cryptography - CRYPTO ’93 Proceeding, LNCS, Vol. 773, 1994, pp Multimedia Security.
Efficient State Update for Key Management
Presentation transcript:

Fingerprinting & Broadcast Encryption for Content Protection

2 Outline Introduction Introduction Fingerprinting & Traitor Tracing Fingerprinting & Traitor Tracing Broadcast Encryption Broadcast Encryption

3 Introduction Fingerprinting Fingerprinting Fingerprinting Traitor tracing Traitor tracing Traitor tracing Traitor tracing Broadcast encryption Broadcast encryption Broadcast encryption Broadcast encryption

4 Fingerprinting & Traitor Tracing Marking assumption Marking assumption Traceability scheme Traceability scheme Frameproof code Frameproof code c-secure code c-secure code c-TA code & c-IPP code c-TA code & c-IPP code Combinatorial properties Combinatorial properties Fingerprinting methods Fingerprinting methods Tracing algorithm Tracing algorithm

5 Fingerprinting & Traitor Tracing - Marking assumption undetectable positions undetectable positions feasible set feasible set

6 Fingerprinting & Traitor Tracing - Marking assumption e.g. A: B: B: Marking Assumption any coalition of c users is only capable of creating an object whose fingerprint lies in the feasible set of the coalition Marking Assumption any coalition of c users is only capable of creating an object whose fingerprint lies in the feasible set of the coalition

7 Fingerprinting & Traitor Tracing - Traceability scheme Traitor tracing schemes ( B. Chor, A. Fiat, M. Naor, and B. Pinkas, 1994 ) Traitor tracing schemes ( B. Chor, A. Fiat, M. Naor, and B. Pinkas, 1994 ) A traitor tracing scheme consists of three components: A traitor tracing scheme consists of three components:

8 Fingerprinting & Traitor Tracing – Frameproof codes c-Frameproof codes (James Shaw, 1995 (1998)) c-Frameproof codes (James Shaw, 1995 (1998))

9 Fingerprinting & Traitor Tracing – c-secure codes totally c-secure code totally c-secure code

10 Fingerprinting & Traitor Tracing - c-TA code & c-IPP code A. Silverberg, J. Staddon, 2001 A. Silverberg, J. Staddon, 2001 c-TA (traceability) c-TA (traceability) c-IPP (identifiable parent property) c-IPP (identifiable parent property)

11 Fingerprinting & Traitor Tracing - c-TA code & c-IPP code Every c-TA code is a c-IPP code. Every c-TA code is a c-IPP code.

12 Fingerprinting & Traitor Tracing - Combinatorial properties “ Combinatorial properties and constructions of traceability schemes and frameproof codes ”, D. R. Stinson, R. Wei, 1997(2001) “ Combinatorial properties and constructions of traceability schemes and frameproof codes ”, D. R. Stinson, R. Wei, 1997(2001) Investigate combinatorial properties and constructions of two recent topics of cryptographic interest: Investigate combinatorial properties and constructions of two recent topics of cryptographic interest: frameproof codes frameproof codes traceability scheme traceability scheme

13 Fingerprinting & Traitor Tracing - Combinatorial properties c-FPC(v,b) c-FPC(v,b) c-TS(k,b,v) c-TS(k,b,v)

14 Fingerprinting & Traitor Tracing - Combinatorial properties

15 Fingerprinting & Traitor Tracing - Combinatorial properties

16 Fingerprinting & Traitor Tracing - Combinatorial properties If there exists a c-TS(k,b,v), then there exists a c-FPC(v,b). If there exists a c-TS(k,b,v), then there exists a c-FPC(v,b).

17 Fingerprinting & Traitor Tracing - Fingerprinting methods AND-resilient codes AND-resilient codes Trivial AND-ACC Trivial AND-ACC Trivial AND-ACC Trivial AND-ACC  0  0  0  0 AND-ACC ( Trape et al., 2003 ) AND-ACC ( Trape et al., 2003 ) AND-ACC ( Trape et al., 2003 ) AND-ACC ( Trape et al., 2003 ) The fingerprinting scheme based on projective space ( Dittmam, 2000 ) The fingerprinting scheme based on projective space ( Dittmam, 2000 ) The fingerprinting scheme based on projective space ( Dittmam, 2000 ) The fingerprinting scheme based on projective space ( Dittmam, 2000 ) Selection-resilient codes Selection-resilient codes  0 combined with (L,N,D) q -ECC, D>L(1-(1/c))  0 combined with (L,N,D) q -ECC, D>L(1-(1/c))  0 combined with (L,N,D) q -ECC, D>L(1-(1/c))  0 combined with (L,N,D) q -ECC, D>L(1-(1/c)) (L,N,D) q -ECC with D>=L(1-1/c 2 ) (Staddon, 2001) (L,N,D) q -ECC with D>=L(1-1/c 2 ) (Staddon, 2001) (L,N,D) q -ECC with D>=L(1-1/c 2 ) (Staddon, 2001) (L,N,D) q -ECC with D>=L(1-1/c 2 ) (Staddon, 2001)

18 Fingerprinting & Traitor Tracing - Tracing algorithms scenario scenario The center broadcasts the encrypted content to users The center broadcasts the encrypted content to users One encryption key and multiple distinct decryption keys One encryption key and multiple distinct decryption keys One cannot compute a new decryption key from a given set of keys One cannot compute a new decryption key from a given set of keys

19 Fingerprinting & Traitor Tracing - Tracing algorithms Static tracing Static tracing Used upon confiscation of a pirate decoder, to determine the identity of a traitor Used upon confiscation of a pirate decoder, to determine the identity of a traitor Such scheme would be ineffective if the pirate were simply to rebroadcast the original content Such scheme would be ineffective if the pirate were simply to rebroadcast the original content Use watermarking methods to allow the broadcaster to generate different versions of the original content Use watermarking methods to allow the broadcaster to generate different versions of the original content Use the watermarks found in the pirate copy to trace its supporting traitors Use the watermarks found in the pirate copy to trace its supporting traitors Drawback: requires one copy of content for each user and so requires very high bandwidth Drawback: requires one copy of content for each user and so requires very high bandwidth

20 Fingerprinting & Traitor Tracing - Tracing algorithms Dynamic tracing (Fiat & Tassa, 2001) Dynamic tracing (Fiat & Tassa, 2001) The content is divided into consecutive segments The content is divided into consecutive segments Embed one of the q marks in each segment, hence creating q versions of the segment (watermarking method) Embed one of the q marks in each segment, hence creating q versions of the segment (watermarking method) In each interval, the user group is divided into q subsets and each subset receives on version of the segment In each interval, the user group is divided into q subsets and each subset receives on version of the segment The subsets are varied in each interval using the rebroadcasted content The subsets are varied in each interval using the rebroadcasted content Trace all colluders with lower bandwidth Trace all colluders with lower bandwidth Drawback: Drawback: Vulnerable to a delayed rebroadcast attack Vulnerable to a delayed rebroadcast attack High real-time computation for regrouping the users and allocating marks to subsets High real-time computation for regrouping the users and allocating marks to subsets

21 Fingerprinting & Traitor Tracing - Tracing algorithms Sequential tracing ( Reihaneh, 2003) Sequential tracing ( Reihaneh, 2003) The channel feedback is only used for tracing and not for allocation of marks to users The channel feedback is only used for tracing and not for allocation of marks to users The mark allocation table is predefined and there is no need for real-time computation to determine the mark allocation of the next interval The mark allocation table is predefined and there is no need for real-time computation to determine the mark allocation of the next interval The need for real-time computation will be minimized The need for real-time computation will be minimized Protects against the delayed reboradcast attack Protects against the delayed reboradcast attack The traitors are identified sequentially The traitors are identified sequentially

22 Broadcast Encryption Key pre-distribution schemes Key pre-distribution schemes Key management Key management

23 Broadcast Encryption - Key pre-distribution scheme In a key pre-distribution scheme, the trusted authority (TA) generates and distributes keys to each user In a key pre-distribution scheme, the trusted authority (TA) generates and distributes keys to each user The goal is to allow TA to broadcast the secure message to a dynamically changing privileged subset of users in such a way that non-privileged users cannot learn the message while minimizing key management related-transmissions The goal is to allow TA to broadcast the secure message to a dynamically changing privileged subset of users in such a way that non-privileged users cannot learn the message while minimizing key management related-transmissions

24 Broadcast Encryption - Key pre-distribution scheme ( P, F )-KPS ( P, F )-Key Predistribution Scheme The scheme is a ( P, F )-Key Predistribution Scheme if it satisfies: ( P, F )-KPS ( P, F )-Key Predistribution Scheme The scheme is a ( P, F )-Key Predistribution Scheme if it satisfies: Each user i in any privileged set P  P can compute k P Each user i in any privileged set P  P can compute k P No forbidden subset F  F disjoint from any privileged subset P has no information on k P No forbidden subset F  F disjoint from any privileged subset P has no information on k P

25 Broadcast Encryption - Key pre-distribution scheme Trivial KPS Trivial KPS Trivial KPS Trivial KPS Shamir threshold KPS (Shamir, 1979) Shamir threshold KPS (Shamir, 1979) Shamir threshold KPS (Shamir, 1979) Shamir threshold KPS (Shamir, 1979) Blom KPS (1984) Blom KPS (1984) Blom KPS (1984) Blom KPS (1984) Fiat-Naor KPS (1993) Fiat-Naor KPS (1993) Fiat-Naor KPS (1993) Fiat-Naor KPS (1993)

26 Broadcast Encryption - Key pre-distribution scheme ( P, F )-One-Time Broadcast Encryption Scheme ( P, F )-One-Time Broadcast Encryption Scheme

27 Broadcast Encryption - Key pre-distribution scheme Beimel-Chor OTBES (1993) Beimel-Chor OTBES (1993) Beimel-Chor OTBES (1993) Beimel-Chor OTBES (1993)

28 Broadcast Encryption - Key pre-distribution scheme ( P, F )-Key Distribution Pattern (Mitchell & Piper, 1988) ( P, F )-Key Distribution Pattern (Mitchell & Piper, 1988)

29 Broadcast Encryption - Key pre-distribution scheme A KDP can be represented by an n  β incidence matrix A=(a ij ) which is defined as follows: A KDP can be represented by an n  β incidence matrix A=(a ij ) which is defined as follows: The KDP can be used to construct KPS. The KDP can be used to construct KPS.

30 Broadcast Encryption - Key pre-distribution scheme Suppose ( U, B ) is a ( P, F )-KDP, then exists a ( P, F )-KPS with information rate 1/max{r i :1 ≤i≤n} r i =|{B j :i  B j }| and total information rate 1/β Suppose ( U, B ) is a ( P, F )-KDP, then exists a ( P, F )-KPS with information rate 1/max{r i :1 ≤i≤n} r i =|{B j :i  B j }| and total information rate 1/β The trivial KPS and Fiat-Naor KPS are both in fact KDPs The trivial KPS and Fiat-Naor KPS are both in fact KDPs The trivial KPS is obtained by taking B to be all t-subsets of U The trivial KPS is obtained by taking B to be all t-subsets of U The Fiat-Naor KPS is produced by taking B to be all subsets of U of cardinality at least n-w The Fiat-Naor KPS is produced by taking B to be all subsets of U of cardinality at least n-w

31 Broadcast Encryption - Key pre-distribution scheme OA KDP (Stinson, 1997) OA KDP (Stinson, 1997) OA KDP (Stinson, 1997) OA KDP (Stinson, 1997) PA KDP (Stinson, 1997) PA KDP (Stinson, 1997) PA KDP (Stinson, 1997) PA KDP (Stinson, 1997)

32 Broadcast Encryption - Key management The purpose of key management is to provide secure procedures for handling cryptographic keying material to be used in symmetric or asymmetric cryptographic mechanisms. The purpose of key management is to provide secure procedures for handling cryptographic keying material to be used in symmetric or asymmetric cryptographic mechanisms. The Open Systems Interconnection (OSI) Security Architecture defines key management as “ the generation, storage, distribution, deletion, archiving and application of keys in accordance with a security policy ”. The Open Systems Interconnection (OSI) Security Architecture defines key management as “ the generation, storage, distribution, deletion, archiving and application of keys in accordance with a security policy ”.

33 Broadcast Encryption - Key management Access control schemes Access control schemes The bit-vector scheme The bit-vector scheme The bit-vector scheme The bit-vector scheme The block-by-block scheme The block-by-block scheme The block-by-block scheme The block-by-block scheme The extended-header scheme The extended-header scheme The extended-header scheme The extended-header scheme The VSPACE scheme The VSPACE scheme The VSPACE scheme The VSPACE scheme The tree scheme The tree scheme

34 Broadcast Encryption - Key management The state update problem The state update problem Content is encrypted using a group key which is known to a group of users in many scenarios Content is encrypted using a group key which is known to a group of users in many scenarios When users leave or join the group, the group key must be changed When users leave or join the group, the group key must be changed prevent leaving members from decrypting content in the future prevent leaving members from decrypting content in the future Prevent joining members from decrypting previous content (backward secrecy) Prevent joining members from decrypting previous content (backward secrecy) O(n) messages O(n) messages How to reduce the overhead of the key update messages? How to reduce the overhead of the key update messages?

35 Broadcast Encryption - Key management The LKH (Logical Key Hierarchy) Scheme

36 Introduction-Fingerprinting Fingerprinting is the process of assigning an unique key for each user Fingerprinting is the process of assigning an unique key for each user The purpose is to identify the person who acquired a particular copy The purpose is to identify the person who acquired a particular copy Implementation Implementation Embed an unique key inside the content for each user Embed an unique key inside the content for each user Encrypt the content and each user has his own decryption key to recover the content Encrypt the content and each user has his own decryption key to recover the content

37 Introduction-Traitor Tracing Collusion attack Collusion attack A group of malicious users (traitors) can collude by combining their keys to create a new pirate key (pirate decoder) A group of malicious users (traitors) can collude by combining their keys to create a new pirate key (pirate decoder) A traitor tracing algorithm is used to trace at least one of the colluders or the group containing the colluders A traitor tracing algorithm is used to trace at least one of the colluders or the group containing the colluders

38 Introduction-Broadcast Encryption Broadcast encryption schemes enable a trusted authority to broadcast a message to the users in a network so that a certain specified subset of authorized users can decrypt it Broadcast encryption schemes enable a trusted authority to broadcast a message to the users in a network so that a certain specified subset of authorized users can decrypt it It involves the problems of the key pre- assignment, key management and even the traceability schemes It involves the problems of the key pre- assignment, key management and even the traceability schemes

39 Fingerprinting & Traitor Tracing - Fingerprinting methods Consist of all n-bit binary vectors that have only a single 0 bit Consist of all n-bit binary vectors that have only a single 0 bit e.g. n=4 C={1110,1101,1011,0111} e.g. n=4 C={1110,1101,1011,0111}

40 Fingerprinting & Traitor Tracing - Fingerprinting methods  0  0 the (n,n)-code containing all n-bit binary words with exactly one 1 the (n,n)-code containing all n-bit binary words with exactly one 1 e.g.  0 (3)={100,010,001} e.g.  0 (3)={100,010,001}

41 Fingerprinting & Traitor Tracing - Fingerprinting methods Use BIBD to construct an AND-ACC Use BIBD to construct an AND-ACC Let (X,A) be a (v,k,1)-BIBD and M the corresponding incidence matrix. If the codevectors are assigned as the bit complement of the columns of M, then the resulting scheme is a (k-1)-resilient AND- ACC. Let (X,A) be a (v,k,1)-BIBD and M the corresponding incidence matrix. If the codevectors are assigned as the bit complement of the columns of M, then the resulting scheme is a (k-1)-resilient AND- ACC. e.g. (7,3,1)-BIBD e.g. (7,3,1)-BIBD

42 Fingerprinting & Traitor Tracing - Fingerprinting methods Constructions using t-designs Constructions using t-designs t-(v, k,λ) design t-(v, k,λ) design BIBD ’ s are 2-(v, k,λ) design BIBD ’ s are 2-(v, k,λ) design e.g. 2-(9, 3,1) design {0,1,6},{0,2,5},{0,3,4},{1,2,4},{3,5,6},{1,5,7} {5,4,8},{4,6,7},{6,2,8},{2,3,7},{3,1,8},{0,7,8} e.g. 2-(9, 3,1) design {0,1,6},{0,2,5},{0,3,4},{1,2,4},{3,5,6},{1,5,7} {5,4,8},{4,6,7},{6,2,8},{2,3,7},{3,1,8},{0,7,8}

43 Fingerprinting & Traitor Tracing - Fingerprinting methods Use techniques from finite projective geometry to construct d-detecting fingerprinting scheme Use techniques from finite projective geometry to construct d-detecting fingerprinting scheme e.g. PG(2,2) 2-detecting e.g. PG(2,2) 2-detecting

44 Fingerprinting & Traitor Tracing - Fingerprinting methods Let  be a c-frameproof (l,p)-code and C be an (L,N,D) p -ECC. Let  ’ be the composition of  and C. Then  ’ is a c-frameproof code, provided D>L(1-(1/c)). Let  be a c-frameproof (l,p)-code and C be an (L,N,D) p -ECC. Let  ’ be the composition of  and C. Then  ’ is a c-frameproof code, provided D>L(1-(1/c)).

45 Fingerprinting & Traitor Tracing - Fingerprinting methods <Theorem>

46 Broadcast Encryption - Key pre-distribution scheme Trivial KPS 1 give every user u i  U its own key and transmit an individually encrypted message E u j (m) to every member u j  P → long transmission time Trivial KPS 1 give every user u i  U its own key and transmit an individually encrypted message E u j (m) to every member u j  P → long transmission time Trivial KPS 2 for every t-subset P  U, the TA gives k p to every member of P → every user stores a huge number of keys Trivial KPS 2 for every t-subset P  U, the TA gives k p to every member of P → every user stores a huge number of keys

47 Broadcast Encryption - Key pre-distribution scheme Blom KPS t=2 Blom KPS t=2

48 Broadcast Encryption - Key pre-distribution scheme Blom KPS e.g. Blom KPS e.g.

49 Broadcast Encryption - Key pre-distribution scheme Fiat-Naor KPS Fiat-Naor KPS

50 Broadcast Encryption - Key pre-distribution scheme Fiat-Naor KPS e.g. Fiat-Naor KPS e.g.

51 Broadcast Encryption - Key pre-distribution scheme Beimel-Chor OTBES Beimel-Chor OTBES

52 Broadcast Encryption - Key pre-distribution scheme Beimel-Chor OTBES e.g. Beimel-Chor OTBES e.g.

53 Broadcast Encryption - Key pre-distribution scheme Secret Sharing Schemes Secret Sharing Schemes

54 Broadcast Encryption - Key pre-distribution scheme Shamir threshold KPS Shamir threshold KPS

55 Broadcast Encryption - Key pre-distribution scheme Shamir threshold KPS e.g. Shamir threshold KPS e.g.

56 Broadcast Encryption - Key pre-distribution scheme Orthogonal Array Orthogonal Array

57 Broadcast Encryption - Key pre-distribution scheme OA KDP OA KDP

58 Broadcast Encryption - Key pre-distribution scheme Perpendicular Arrays Perpendicular Arrays

59 Broadcast Encryption - Key pre-distribution scheme PA KDP PA KDP

60 Broadcast Encryption - Key pre-distribution scheme PA KPS PA KPS e.g. e.g.

61 Broadcast Encryption - Key pre-distribution scheme PA KDP PA KDP e.g. e.g.

62 Broadcast Encryption - Key management The bit-vector scheme The bit-vector scheme Popular access control scheme (analog European satellite TV system, Popular access control scheme (analog European satellite TV system, Sky VideoCrypt systems, … ) Sky VideoCrypt systems, … ) All the programs are encrypted with the same key, witch is stored in every set-top terminal (STT) All the programs are encrypted with the same key, witch is stored in every set-top terminal (STT) The STT decrypts a program p only if the p-th bit of bit-vector b[p]=1. The STT decrypts a program p only if the p-th bit of bit-vector b[p]=1.

63 Broadcast Encryption - Key management The block-by-block scheme The block-by-block scheme The programs are split into n disjoint blocks, and all the programs belonging to a block are encrypted using the same key The programs are split into n disjoint blocks, and all the programs belonging to a block are encrypted using the same key The STT stores the keys for each block that the user buys The STT stores the keys for each block that the user buys

64 Broadcast Encryption - Key management The extended-header scheme The extended-header scheme Attach cryptographic header information to each program Attach cryptographic header information to each program Arrange the programs into predefined packages, and each package has a key Arrange the programs into predefined packages, and each package has a key Need large headers to each program in order to achieve flexibility in packaging the programs Need large headers to each program in order to achieve flexibility in packaging the programs

65 Broadcast Encryption - Key management The VSPACE scheme The VSPACE scheme Attach only the single n-bit cryptographic identifier (CID) to a program Attach only the single n-bit cryptographic identifier (CID) to a program The encryption key of a program is function of its CID p : Key(p)=Mp The encryption key of a program is function of its CID p : Key(p)=Mp The columns of M are master keys, which are linearly independent vectors. The columns of M are master keys, which are linearly independent vectors.