Explore chapters and articles related to this topic
Digital Rights Management for Consumer Devices
Published in Borko Furht, Darko Kirovski, Multimedia Encryption and Authentication Techniques and Applications, 2006
Broadcast encryption brings with it several desirable properties, not the least of which is that it needs substantially less device overhead than public key cryptography. However, it also turns out to be the ideal cryptographic primitive when you are building a system that works autonomously and anonymously. Public key cryptography is fundamentally based on identity. Parties first exchange their certificates and then enter a protocol in which they each prove that they have the private key that corresponds to the public key in that certificate. In broadcast encryption, identity is irrelevant. A device can safely encrypt content based on a media key block, never knowing which device might finally end up decrypting it. However, the first device is confident that this unknown second device is compliant, because it must be to correctly process the media key block.
Digital Rights Management for Consumer Devices
Published in Borko Furht, Darko Kirovski, Multimedia Security Handbook, 2004
Broadcast encryption brings with it several desirable properties, not the least of which is that it needs substantially less device overhead than public key cryptography. However, it also turns out to be the ideal cryptographic primitive when you are building a system that works autonomously and anonymously. Public key cryptography is fundamentally based on identity. Parties first exchange their certificates and then enter a protocol in which they each prove that they have the private key that corresponds to the public key in that certificate. In broadcast encryption, identity is irrelevant. A device can safely encrypt content based on a media key block, never knowing which device might finally end up decrypting it. However, the first device is confident that this unknown second device is compliant, because it must be to correctly process the media key block.
Privacy-Preserving Attribute-Based Encryption
Published in Dijiang Huang, Qiuxiang Dong, Yan Zhu, Attribute-Based Encryption and Access Control, 2020
Dijiang Huang, Qiuxiang Dong, Yan Zhu
A broadcast encryption is usually applied in the scenario wherein a broadcaster sends messages to multiple receivers through an insecure channel. The broadcaster should be able to select a subset of users with certain policies from all receivers, and consequently only the eligible users are able to decrypt the ciphertexts and read the messages. It is possible that the number of all possible receivers is infinite, and the subset of privileged receivers changes dramatically in each broadcast based on the content of the message and the will of the broadcaster.
Fault-Tolerant Based Group Key Servers with Enhancement of Utilizing the Contributory Server for Cloud Storage Applications
Published in IETE Journal of Research, 2023
K. Vivekrabinson, K. Muneeswaran
Dynamic contributory broadcast encryption for key management is proposed by Lei [21], which allows a group of fog nodes to generate a public encryption key and each node’s decryption key without a trusted dealer. In this scheme, any nongroup member (adversary) can participate in the group communication because of the publically available encryption key which leads to resource wastage. To secure the group communication from adversaries Zheng et al. [22] proposed a hierarchical group key agreement protocol using orientable attributes which uses different access permissions for members. By the help of different permission levels, one member can send some secret information to some member, rather than others in the group. However this scheme suffers from calculation and distribution of group keys to members because of the multiple permission levels.
Smart Cities, Playable Cities, and Cybersecurity: A Systematic Review
Published in International Journal of Human–Computer Interaction, 2023
Gustav Verhulsdonck, Jennifer L. Weible, Susan Helser, Nancy Hajduk
Three articles were coded as both “technology” and “people,” indicating that humans were considered as a part of the focus on enhanced privacy and security within smart cities. Aldeen and Salleh (2019) defined smart cities as integrated information and communication technologies that improve the quality of life of people. They utilized a heuristic anonymization technique to manage private data within the cloud in smart cities, which secures privacy of data when transferred between user to cloud storage to the end recipient. Chaturvedi et al. (2019) considered both the infrastructures and systems and the individuals’ experiences, thereby it was double coded as people and technology. They outlined key requirements for developing secure Spatial Data Infrastructures that secure access to data and integrate Smart City systems, and proposed ways to ensure privacy, security, and controlled access using Oauth2 access tokens, OpenID user claims, and security assertion markup language through single-sign-on authentications. An overview of the users’ experiences, as well as presenting a protocol and encryption system, was found in the Lai et al. (2017) article. In this study, Lai et al. examine a protocol that uses broadcast encryption. Their process provides a method for security of data, data privacy, and identity privacy for both user and developer. Overall security of the protocol is through revocable identity-based broadcast encryption where the users are anonymous and access can be revoked without revealing identities or message content. In each of these studies, consideration of the people using the system, not just those collecting and using the data, was found.
Guarded dual authentication based DRM with resurgence dynamic encryption techniques
Published in Enterprise Information Systems, 2019
Neha Agarwal, Ajay Rana, J.P. Pandey
Zhou, Huang, and Wang (2015) discussed about privacy protecting constant Cipher text Policy Attribute Based Encryption (PP-CPABE) technique which maintains the constant cipher text estimate for any number of attributes and furthermore introduced privacy saving attribute based broadcast encryption (PP-AB-BE)method for maintaining expressive hidden access policy. In this method, a potential malicious attacker does not reflect on both the access policies and user’s secrecy. Moreover the past privacy saving method also saves the secrecy but it requires higher cipher text size.