Conditionally-perfect secrecy and a provably-secure randomized cipher
Journal of Cryptology - Eurocrypt '90
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
Nark: receiver-based multicast non-repudiation and key management
Proceedings of the 1st ACM conference on Electronic commerce
Security Weaknesses in a Randomized Stream Cipher
ACISP '00 Proceedings of the 5th Australasian Conference on Information Security and Privacy
Revocation and Tracing Schemes for Stateless Receivers
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
The LSD Broadcast Encryption Scheme
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '98 Proceedings of the 18th Annual International Cryptology Conference on Advances in Cryptology
Large Scale distributed watermarking of multicast media through encryption
Proceedings of the IFIP TC6/TC11 International Conference on Communications and Multimedia Security Issues of the New Century
Chameleon - A New Kind of Stream Cipher
FSE '97 Proceedings of the 4th International Workshop on Fast Software Encryption
Watercasting: Distributed Watermarking of Multicast Media
NGC '99 Proceedings of the First International COST264 Workshop on Networked Group Communication
Tamper resistance: a cautionary note
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
A note on the limits of collusion-resistant watermarks
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
One-Way chain based broadcast encryption schemes
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
New paradigms for effective multicasting and fingerprinting of entertainment media
IEEE Communications Magazine
Secure spread spectrum watermarking for multimedia
IEEE Transactions on Image Processing
Protection and retrieval of encrypted multimedia content: when cryptography meets signal processing
EURASIP Journal on Information Security
IWDW '07 Proceedings of the 6th International Workshop on Digital Watermarking
Fingercasting-joint fingerprinting and decryption of broadcast messages
Transactions on data hiding and multimedia security II
Secure client-side ST-DM watermark embedding
IEEE Transactions on Information Forensics and Security
Combining Tardos fingerprinting codes and fingercasting
IH'07 Proceedings of the 9th international conference on Information hiding
Client side embedding for ST-DM watermarks
ICIP'09 Proceedings of the 16th IEEE international conference on Image processing
Computer Methods and Programs in Biomedicine
Secure watermark embedding through partial encryption
IWDW'06 Proceedings of the 5th international conference on Digital Watermarking
IH'12 Proceedings of the 14th international conference on Information Hiding
Broadcast monitoring protocol based on secure watermark embedding
Computers and Electrical Engineering
Hi-index | 0.00 |
We propose a stream cipher that provides confidentiality, traceability and renewability in the context of broadcast encryption. We prove it to be as secure as the generic pseudo-random sequence on which it operates. This encryption scheme, termed fingercasting scheme, achieves joint decryption and fingerprinting of broadcast messages in such a way that an adversary cannot separate both operations or prevent them from happening simultaneously. The scheme is a combination of a broadcast encryption scheme, a fingerprinting scheme and an encryption scheme inspired by the Chameleon cipher. It is the first to provide a formal security proof and a non-constant lower bound for resistance against collusion of malicious users i.e., a minimum number of content copies needed to remove all fingerprints. The scheme is efficient and includes parameters that allow, for example, to trade-off storage size for computation cost at the receiving end.