{"title":"一种多密钥安全视频代理方案的共谋攻击","authors":"Yongdong Wu, F. Bao","doi":"10.1145/1027527.1027617","DOIUrl":null,"url":null,"abstract":"In ACM Multimedia'2002, a video proxy scheme was proposed for secure video delivery. In the scheme, a video is cached in proxies in encrypted form so that it remains non-disclosed even if the proxies are compromised. The proxies re-encrypt the video before its distribution, and different clients would receive different keys for the protected video. In this paper we present a security analysis on the scheme and show that the scheme is subject to collusion attack. Two or more clients working together can find out video server's secret keys and hence compromise the system. The countermeasure to the collusion attack is presented.","PeriodicalId":292207,"journal":{"name":"MULTIMEDIA '04","volume":"42 22","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2004-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Collusion attack on a multi-key secure video proxy scheme\",\"authors\":\"Yongdong Wu, F. Bao\",\"doi\":\"10.1145/1027527.1027617\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In ACM Multimedia'2002, a video proxy scheme was proposed for secure video delivery. In the scheme, a video is cached in proxies in encrypted form so that it remains non-disclosed even if the proxies are compromised. The proxies re-encrypt the video before its distribution, and different clients would receive different keys for the protected video. In this paper we present a security analysis on the scheme and show that the scheme is subject to collusion attack. Two or more clients working together can find out video server's secret keys and hence compromise the system. The countermeasure to the collusion attack is presented.\",\"PeriodicalId\":292207,\"journal\":{\"name\":\"MULTIMEDIA '04\",\"volume\":\"42 22\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2004-10-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"MULTIMEDIA '04\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/1027527.1027617\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"MULTIMEDIA '04","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/1027527.1027617","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Collusion attack on a multi-key secure video proxy scheme
In ACM Multimedia'2002, a video proxy scheme was proposed for secure video delivery. In the scheme, a video is cached in proxies in encrypted form so that it remains non-disclosed even if the proxies are compromised. The proxies re-encrypt the video before its distribution, and different clients would receive different keys for the protected video. In this paper we present a security analysis on the scheme and show that the scheme is subject to collusion attack. Two or more clients working together can find out video server's secret keys and hence compromise the system. The countermeasure to the collusion attack is presented.