CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
Security Engineering: A Guide to Building Dependable Distributed Systems
Security Engineering: A Guide to Building Dependable Distributed Systems
Revocation and Tracing Schemes for Stateless Receivers
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
The LSD Broadcast Encryption Scheme
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '98 Proceedings of the 18th Annual International Cryptology Conference on Advances in Cryptology
Support for multi-level security policies in DRM architectures
NSPW '04 Proceedings of the 2004 workshop on New security paradigms
Tamper resistance: a cautionary note
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
One-Way chain based broadcast encryption schemes
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
Distributed Attribute-Based Encryption
Information Security and Cryptology --- ICISC 2008
Hi-index | 0.00 |
Most current Digital Rights Management (DRM) systems rely on the doubtful assumption that all devices are equally trustworthy. This allows a pirate to obtain access if he undetectedly breaks just one arbitrary device. As there is a multitude of different devices, trust assumptions and policies should depend on the security level of each device type. For each content item to be distributed, the content providers should be able to base their access decision on various properties that the devices might have, such as the devices' tamper resistance, geographical region, output interface or device model. We propose a hierarchical property-based broadcast encryption scheme enabling a variety of new business models. It operates with an arbitrary number of properties, including one hierarchical property such as tamper resistance. The scheme is secure and more efficient than existing Broadcast Encryption (BE) schemes in the hierarchical setting. As the first building block, we formalize the notion of properties with respect to BE and show an approach for representing them in a binary tree structure. As the second building block, we use existing BE schemes to achieve short ciphertexts. Specifically, we enhance the Complete Subtree scheme with pseudo-random chains to embed the hierarchical property.