防御海盗进化攻击

Q2 Mathematics
Hongxia Jin, J. Lotspiech, Serdar Pehlivanoglu
{"title":"防御海盗进化攻击","authors":"Hongxia Jin, J. Lotspiech, Serdar Pehlivanoglu","doi":"10.1504/IJACT.2010.033796","DOIUrl":null,"url":null,"abstract":"A trace and revoke scheme is an encryption scheme for secure content distribution so that only authorized users can access the copyrighted content. When a clone device is recovered, the \"trace\" component detects the pirate users that have compromised the secret keys in their devices and participated in the construction of the clone device. The \"revoke\" component excludes the pirate users from accessing the future content. The state-of-art trace-revoke scheme is the very efficient subset difference based NNL scheme [11] which is also deployed in AACS [1], the industry new content protection standard for high definition DVDs. While its revocation and tracing are both very efficient, as pointed out by Kiayias and Pehlivanoglu from Crypto 2007, in its deployment NNL scheme may suffer from a new attack called pirate evolution attack . In this attack attackers reveal the compromised secret keys to the clone decoder very slowly through a number of generations of pirate decoders that will take long time to disable them all. They showed in a system with N users, the attacker can produce up to t *logN generations of pirate decoders given t sets of keys. In AACS context, that means a pirate can produce more than 300 generations of decoders by compromising only 10 devices. If this happens, it will indeed be a nightmare. \n \nIn this paper we are interested in practical solutions that can defend well against the pirate evolution attack in practice. In particular we devise an easy and efficient approach for the subset difference based NNL scheme [11] to defend well against the potential pirate evolution attack. Indeed it takes as small as 2 generations to detect and disable a traitor in a coalition. This can be achieved by only negligibly increasing the cipher text header size in an application like AACS. The simplicity, efficiency and practicality of our approach has made AACS to adopt it to defend against the pirate evolution attack.","PeriodicalId":53552,"journal":{"name":"International Journal of Applied Cryptography","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2009-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Defending against the pirate evolution attack\",\"authors\":\"Hongxia Jin, J. Lotspiech, Serdar Pehlivanoglu\",\"doi\":\"10.1504/IJACT.2010.033796\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A trace and revoke scheme is an encryption scheme for secure content distribution so that only authorized users can access the copyrighted content. When a clone device is recovered, the \\\"trace\\\" component detects the pirate users that have compromised the secret keys in their devices and participated in the construction of the clone device. The \\\"revoke\\\" component excludes the pirate users from accessing the future content. The state-of-art trace-revoke scheme is the very efficient subset difference based NNL scheme [11] which is also deployed in AACS [1], the industry new content protection standard for high definition DVDs. While its revocation and tracing are both very efficient, as pointed out by Kiayias and Pehlivanoglu from Crypto 2007, in its deployment NNL scheme may suffer from a new attack called pirate evolution attack . In this attack attackers reveal the compromised secret keys to the clone decoder very slowly through a number of generations of pirate decoders that will take long time to disable them all. They showed in a system with N users, the attacker can produce up to t *logN generations of pirate decoders given t sets of keys. In AACS context, that means a pirate can produce more than 300 generations of decoders by compromising only 10 devices. If this happens, it will indeed be a nightmare. \\n \\nIn this paper we are interested in practical solutions that can defend well against the pirate evolution attack in practice. In particular we devise an easy and efficient approach for the subset difference based NNL scheme [11] to defend well against the potential pirate evolution attack. Indeed it takes as small as 2 generations to detect and disable a traitor in a coalition. This can be achieved by only negligibly increasing the cipher text header size in an application like AACS. The simplicity, efficiency and practicality of our approach has made AACS to adopt it to defend against the pirate evolution attack.\",\"PeriodicalId\":53552,\"journal\":{\"name\":\"International Journal of Applied Cryptography\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-04-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Applied Cryptography\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1504/IJACT.2010.033796\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"Mathematics\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Applied Cryptography","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1504/IJACT.2010.033796","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"Mathematics","Score":null,"Total":0}
引用次数: 5

摘要

跟踪和撤销方案是一种用于安全内容分发的加密方案,以便只有授权用户才能访问受版权保护的内容。当克隆设备被恢复时,“跟踪”组件会检测到已经泄露了其设备中的密钥并参与克隆设备构建的盗版用户。“revoke”组件将禁止盗版用户访问未来的内容。最先进的追溯撤销方案是非常高效的基于子集差异的NNL方案[11],该方案也部署在AACS[1]中,AACS[1]是业界最新的高清dvd内容保护标准。正如Kiayias和Pehlivanoglu在Crypto 2007中指出的那样,虽然它的撤销和跟踪都非常有效,但在部署NNL方案时可能会遭受一种称为海盗进化攻击的新攻击。在这种攻击中,攻击者通过几代海盗解码器非常缓慢地揭示了克隆解码器的受损密钥,这将需要很长时间才能禁用它们。他们表明,在一个有N个用户的系统中,攻击者可以在给定t组密钥的情况下产生多达t *logN代的盗版解码器。在AACS环境下,这意味着一个盗版者可以通过入侵10台设备来生产300多代解码器。如果发生这种情况,那将是一场噩梦。在本文中,我们感兴趣的是在实践中能够很好地防御海盗进化攻击的实用解决方案。特别是,我们设计了一种简单有效的基于子集差分的NNL方案[11],可以很好地防御潜在的海盗进化攻击。事实上,只需两代人就能发现并消灭联盟中的叛徒。这可以通过在像AACS这样的应用程序中微不足道地增加密文报头大小来实现。该方法的简单、高效和实用性使得AACS采用它来防御海盗进化攻击。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Defending against the pirate evolution attack
A trace and revoke scheme is an encryption scheme for secure content distribution so that only authorized users can access the copyrighted content. When a clone device is recovered, the "trace" component detects the pirate users that have compromised the secret keys in their devices and participated in the construction of the clone device. The "revoke" component excludes the pirate users from accessing the future content. The state-of-art trace-revoke scheme is the very efficient subset difference based NNL scheme [11] which is also deployed in AACS [1], the industry new content protection standard for high definition DVDs. While its revocation and tracing are both very efficient, as pointed out by Kiayias and Pehlivanoglu from Crypto 2007, in its deployment NNL scheme may suffer from a new attack called pirate evolution attack . In this attack attackers reveal the compromised secret keys to the clone decoder very slowly through a number of generations of pirate decoders that will take long time to disable them all. They showed in a system with N users, the attacker can produce up to t *logN generations of pirate decoders given t sets of keys. In AACS context, that means a pirate can produce more than 300 generations of decoders by compromising only 10 devices. If this happens, it will indeed be a nightmare. In this paper we are interested in practical solutions that can defend well against the pirate evolution attack in practice. In particular we devise an easy and efficient approach for the subset difference based NNL scheme [11] to defend well against the potential pirate evolution attack. Indeed it takes as small as 2 generations to detect and disable a traitor in a coalition. This can be achieved by only negligibly increasing the cipher text header size in an application like AACS. The simplicity, efficiency and practicality of our approach has made AACS to adopt it to defend against the pirate evolution attack.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
International Journal of Applied Cryptography
International Journal of Applied Cryptography Mathematics-Applied Mathematics
CiteScore
2.00
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信