Normal view MARC view ISBD view

Encryption for Digital Content [electronic resource] / by Aggelos Kiayias, Serdar Pehlivanoglu.

By: Kiayias, Aggelos [author.].
Contributor(s): Pehlivanoglu, Serdar [author.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Advances in Information Security: 52Publisher: Boston, MA : Springer US, 2010Description: XIII, 209 p. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9781441900449.Subject(s): Computer science | Computer Communication Networks | Data protection | Data structures (Computer science) | Data encryption (Computer science) | Coding theory | Computer Science | Data Encryption | Data Structures, Cryptology and Information Theory | Systems and Data Security | Coding and Information Theory | Data Structures | Computer Communication NetworksDDC classification: 005.82 Online resources: Click here to access online
Contents:
Fingerprinting Codes -- Broadcast Encryption -- Traitor Tracing -- Trace and Revoke Schemes -- Pirate Evolution.
In: Springer eBooksSummary: Cryptography is an area that traditionally focused on secure communication, authentication and integrity. In recent times though, there is a wealth of novel  fine-tuned cryptographic techniques that sprung up as cryptographers focused on the specialised problems that arise in digital content distribution. These include fingerprinting codes, traitor tracing, broadcast encryption and others. This book is an introduction to this new generation of cryptographic mechanisms as well as an attempt to provide a cohesive presentation of these techniques. Encryption for Digital Content details the subset cover framework (currently used in the AACS encryption of Blu-Ray disks), fingerprinting codes, traitor tracing schemes as well as related security models and attacks.   It provides an extensive treatment of the complexity of the revocation problem for multi-receiver (subscriber) encryption mechanisms, as well as the complexity of the traceability problem. Pirate evolution type of attacks are covered in depth. This volume also illustrates the manner that attacks affect parameter selection, and how this impacts implementations. The authors gratefully acknowledge the support of the National Science Foundation under Grant No. 0447808.
Tags from this library: No tags from this library for this title. Log in to add tags.
No physical items for this record

Fingerprinting Codes -- Broadcast Encryption -- Traitor Tracing -- Trace and Revoke Schemes -- Pirate Evolution.

Cryptography is an area that traditionally focused on secure communication, authentication and integrity. In recent times though, there is a wealth of novel  fine-tuned cryptographic techniques that sprung up as cryptographers focused on the specialised problems that arise in digital content distribution. These include fingerprinting codes, traitor tracing, broadcast encryption and others. This book is an introduction to this new generation of cryptographic mechanisms as well as an attempt to provide a cohesive presentation of these techniques. Encryption for Digital Content details the subset cover framework (currently used in the AACS encryption of Blu-Ray disks), fingerprinting codes, traitor tracing schemes as well as related security models and attacks.   It provides an extensive treatment of the complexity of the revocation problem for multi-receiver (subscriber) encryption mechanisms, as well as the complexity of the traceability problem. Pirate evolution type of attacks are covered in depth. This volume also illustrates the manner that attacks affect parameter selection, and how this impacts implementations. The authors gratefully acknowledge the support of the National Science Foundation under Grant No. 0447808.

There are no comments for this item.

Log in to your account to post a comment.

2017 | The Technical University of Kenya Library | +254(020) 2219929, 3341639, 3343672 | library@tukenya.ac.ke | Haile Selassie Avenue