Fingerprinting long forgiving messages
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
Secure group communications using key graphs
IEEE/ACM Transactions on Networking (TON)
A secure multicast protocol with copyright protection
ACM SIGCOMM Computer Communication Review
WHIM: watermarking multicast video with a hierarchy of intermediaries
Computer Networks: The International Journal of Computer and Telecommunications Networking
Efficient Revocation Schemes for Secure Multicast
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
Binary Codes for Collusion-Secure Fingerprinting
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
Revocation and Tracing Schemes for Stateless Receivers
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
The LSD Broadcast Encryption Scheme
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
A 2-Secure Code with Efficient Tracing Algorithm
INDOCRYPT '02 Proceedings of the Third International Conference on Cryptology: Progress in Cryptology
A Revocation Scheme with Minimal Storage at Receivers
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Error- and Collusion-Secure Fingerprinting for Digital Data
IH '99 Proceedings of the Third International Workshop on Information Hiding
Collusion Secure q-ary Fingerprinting for Perceptual Content
DRM '01 Revised Papers from the ACM CCS-8 Workshop on Security and Privacy in Digital Rights Management
Large Scale distributed watermarking of multicast media through encryption
Proceedings of the IFIP TC6/TC11 International Conference on Communications and Multimedia Security Issues of the New Century
Watercasting: Distributed Watermarking of Multicast Media
NGC '99 Proceedings of the First International COST264 Workshop on Networked Group Communication
Collusion-secure fingerprinting for digital data
IEEE Transactions on Information Theory
Combinatorial properties of frameproof and traceability codes
IEEE Transactions on Information Theory
New results on frame-proof codes and traceability schemes
IEEE Transactions on Information Theory
Hi-index | 0.00 |
A secure multicast system allows a sender to send a message over a multicast channel to a dynamically changing group of users. A group key management solution, efficiently accommodating dynamic membership, is desirable. Fingerprinting technique has also been employed to trace traitors who illegally retransmit decrypted content to other unauthorized receivers. But, it makes key management much more challengeable. This paper studies this scenario, advances a notion of ”subgroup key management”, and indicates it should be collusion-free. Moreover, this paper also studies a general subset notion and employs it in subgroup key management approach. Especially, our dynamic key assignment scheme is a generalized mode of Logical Key Hierarchy (LKH). At same time, both symmetric and asymmetric cryptographic approaches for the subgroup key distribution are studied. Our approach can not only handle highly dynamic membership of a multicast session but also own very low overhead of communication, and it is collusion-free. Finally, the paper proves the security of proposed solutions and compares its efficiencies.