Back to Search
Start Over
Toward tracing and revoking schemes secure against collusion and any form of secret information leakage.
- Source :
-
International Journal of Information Security . Feb2013, Vol. 12 Issue 1, p1-17. 17p. 2 Diagrams, 6 Charts. - Publication Year :
- 2013
-
Abstract
- Tracing and revoking schemes enable a center to deliver protected content to a subset of privileged users of a given universe. The main property these schemes enjoy is that traitors, who illegally help unauthorized users to set up a pirate decoder for gaining access to the protected content, can be identified and removed from the privileged subset. Historically, traitors have been modeled as users who privately share their secret information with unauthorized users. However, in the Pirates 2.0 attack model, traitors collaborate in public and partially share their secret information with a certified guarantee of anonymity. Several classes of tracing and revoking schemes, like tree-based tracing and revoking schemes and code-based tracing schemes, are subject to such a new threat. In this paper we propose methods to cope with the Pirates 2.0 attack. We focus our attention on the class of tree-based schemes. We start by discussing some simple techniques, which can partially help to deal with the attack, and point out their limits. Then, looking through the literature, we recover some ideas, which can be used to strengthen tracing and revoking schemes. We also analyze the trade-off which can be obtained by applying these ideas to the schemes. Finally, we describe new hybrid schemes, obtained by mixing previous constructions, which can be used to face up the Pirates 2.0 attack. [ABSTRACT FROM AUTHOR]
Details
- Language :
- English
- ISSN :
- 16155262
- Volume :
- 12
- Issue :
- 1
- Database :
- Academic Search Index
- Journal :
- International Journal of Information Security
- Publication Type :
- Academic Journal
- Accession number :
- 84936170
- Full Text :
- https://doi.org/10.1007/s10207-012-0186-1