Fingerprinting Codes.- Broadcast Encryption.- Trailor Tracing.- Trace and Revoke Schemes.- Pirate Evolution.- References.- Index
Fingerprinting Codes.- Broadcast Encryption.- Traitor Tracing.- Trace and Revoke Schemes.- Pirate Evolution.
Cryptography is an area that traditionally focused on secure communication, authentication and integrity. In recent times though, there is a wealth of novel fine-tuned cryptographic techniques that sprung up as cryptographers focused on the specialised problems that arise in digital content distribution. These include fingerprinting codes, traitor tracing, broadcast encryption and others. This book is an introduction to this new generation of cryptographic mechanisms as well as an attempt to provide a cohesive presentation of these techniques.
Encryption for Digital Content details the subset cover framework (currently used in the AACS encryption of Blu-Ray disks), fingerprinting codes, traitor tracing schemes as well as related security models and attacks. It provides an extensive treatment of the complexity of the revocation problem for multi-receiver (subscriber) encryption mechanisms, as well as the complexity of the traceability problem. Pirate evolution type of attacks are covered in depth. This volume also illustrates the manner that attacks affect parameter selection, and how this impacts implementations. The authors gratefully acknowledge the support of the National Science Foundation under Grant No. 0447808.
First book to combine exposition of underlying mathematics, attack models and parameter analysis
Includes a complete description of broadcast encryption with various revocation and tracing functionalities
Provides a solid treatment on this subject