WO2022256555A3 - Function-embedded traitor tracing for a digital content distribution system - Google Patents

Function-embedded traitor tracing for a digital content distribution system Download PDF

Info

Publication number
WO2022256555A3
WO2022256555A3 PCT/US2022/032001 US2022032001W WO2022256555A3 WO 2022256555 A3 WO2022256555 A3 WO 2022256555A3 US 2022032001 W US2022032001 W US 2022032001W WO 2022256555 A3 WO2022256555 A3 WO 2022256555A3
Authority
WO
WIPO (PCT)
Prior art keywords
embedded
function
distribution system
digital content
content distribution
Prior art date
Application number
PCT/US2022/032001
Other languages
French (fr)
Other versions
WO2022256555A2 (en
Inventor
Mark ZHANDRY
Original Assignee
Ntt Research, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ntt Research, Inc. filed Critical Ntt Research, Inc.
Publication of WO2022256555A2 publication Critical patent/WO2022256555A2/en
Publication of WO2022256555A3 publication Critical patent/WO2022256555A3/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/008Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving homomorphic encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3218Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs

Abstract

A white box traitor tracing scheme may execute, in the general decoder setting, providing consistency and/or privacy. The schemes may be instantiated under various assumptions ranging from public key encryption and non-interactive zero knowledge (NIZK) proofs, to indistinguishability obfuscation, with different trade-offs.
PCT/US2022/032001 2021-06-03 2022-06-02 Function-embedded traitor tracing for a digital content distribution system WO2022256555A2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US202163196484P 2021-06-03 2021-06-03
US63/196,484 2021-06-03

Publications (2)

Publication Number Publication Date
WO2022256555A2 WO2022256555A2 (en) 2022-12-08
WO2022256555A3 true WO2022256555A3 (en) 2023-02-09

Family

ID=84324580

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2022/032001 WO2022256555A2 (en) 2021-06-03 2022-06-02 Function-embedded traitor tracing for a digital content distribution system

Country Status (1)

Country Link
WO (1) WO2022256555A2 (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080075287A1 (en) * 2006-09-13 2008-03-27 Dan Boneh Method and apparatus for tracing the source of decryption keys used by a decoder
US20080152132A1 (en) * 2006-12-22 2008-06-26 Samsung Electronics Co., Ltd. Broadcast encryption method and broadcast decryption method thereof
US20130219189A1 (en) * 2012-02-21 2013-08-22 Microchip Technology Incorporated Cryptographic Transmission System
US20200186347A1 (en) * 2017-05-10 2020-06-11 B.G. Negev Technologies And Applications Ltd., At Ben-Gurion University Method and system for performing broadcast encryption with revocation capability
US20200252208A1 (en) * 2016-09-01 2020-08-06 Nippon Telegraph And Telephone Corporation Key exchange method and key exchange system
US20200336292A1 (en) * 2019-04-16 2020-10-22 NEC Laboratories Europe GmbH Method and system for multi-authority controlled functional encryption

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080075287A1 (en) * 2006-09-13 2008-03-27 Dan Boneh Method and apparatus for tracing the source of decryption keys used by a decoder
US20080152132A1 (en) * 2006-12-22 2008-06-26 Samsung Electronics Co., Ltd. Broadcast encryption method and broadcast decryption method thereof
US20130219189A1 (en) * 2012-02-21 2013-08-22 Microchip Technology Incorporated Cryptographic Transmission System
US20200252208A1 (en) * 2016-09-01 2020-08-06 Nippon Telegraph And Telephone Corporation Key exchange method and key exchange system
US20200186347A1 (en) * 2017-05-10 2020-06-11 B.G. Negev Technologies And Applications Ltd., At Ben-Gurion University Method and system for performing broadcast encryption with revocation capability
US20200336292A1 (en) * 2019-04-16 2020-10-22 NEC Laboratories Europe GmbH Method and system for multi-authority controlled functional encryption

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
RISHAB GOYAL ; VENKATA KOPPULA ; BRENT WATERS: "New Approaches to Traitor Tracing with Embedded Identities", IACR, INTERNATIONAL ASSOCIATION FOR CRYPTOLOGIC RESEARCH, vol. 20190829:111425, 29 August 2019 (2019-08-29), International Association for Cryptologic Research , pages 1 - 67, XP061033303 *

Also Published As

Publication number Publication date
WO2022256555A2 (en) 2022-12-08

Similar Documents

Publication Publication Date Title
EP4254248A3 (en) Cryptographic methods and systems for managing digital certificates
WO2008066671A3 (en) Indentity-based-encryption extensions formed using multiple instances of an identity based encryption scheme
WO2019228557A3 (en) System and method for decentralized-identifier authentication
ATE445269T1 (en) METHOD FOR DISTRIBUTING ENCRYPTED DATA
DE60117618D1 (en) Initial viewing period for authorizing multimedia content
WO2002060118A3 (en) Method for tracing traitor receivers in a broadcast encryption system
WO2005062919A3 (en) Public key encryption for groups
MY166007A (en) Method and system for mastering and distributing enhanced color space content
PL345531A1 (en) Method and apparatus for secure communication of information between a plurality of digital audiovisual devices
EP0798892A3 (en) Creation and distribution of digital documents
DK0786178T3 (en) A secret-key certificates
MX2019008264A (en) Homomorphic white box system and method for using same.
MXPA02009771A (en) Authentication of data transmitted in a digital transmission system.
WO2006084036A3 (en) System and method for providing peer-to-peer communication
PL1867096T3 (en) Method and system for receiving a multimedia signal, cryptographic entity for said reception method and system, and method and black box for producing said cryptographic entity
GB2398713B (en) Limiting service provision to group members
WO2005004457A3 (en) A partial dual-encrypted stream utilizing program map tables
MX2023006932A (en) Method and device for color gamut mapping.
WO2008045870A3 (en) Conformant public key infrastructures
WO2006088596A3 (en) Key management system for digital cinema
TW200719662A (en) Login method for establishing a wireless local area network connection with a keeping-secret function and its system thereof
NO20003651L (en) Procedure and arrangement for conveying a private message to selected members
WO2022256555A3 (en) Function-embedded traitor tracing for a digital content distribution system
WO2006056938A3 (en) Decoding/decrypting based on security score
GB2573940A (en) System and method for providing least privilege access in a microservices architecture

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22816869

Country of ref document: EP

Kind code of ref document: A2

NENP Non-entry into the national phase

Ref country code: DE