Abstract
With the rapid growth of broadband infrastructure, it is thought that the bottleneck for video-on-demand service through Internet is being cleared. However, digital video content protection and consumers privacy protection emerge as new major obstacles. In this paper we propose an online video distribution system with strong content security and privacy protection. We mainly focus on the study of security and privacy problems related to the system. Besides presenting the new system, we intensively discuss some relevant cryptographic issues, such as content protection, private information retrieval, super-speed encryption/decryption for video, and PKC with fast decryption etc. The paper can be viewed as one that proposes practical solutions to real life problems, as well as one that presents applied cryptography research.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
R. Anderson and M. Kuhn, “Low cost attacks on tamper resistant devices”, in Security protocols: International Workshop’97, LNCS 1361, Springer-Verlag, pp. 125–136, 1997.
F. Bao, R. Deng, P. Feng, “An efficient and practical scheme for privacy protection in e-commerce of digital goods”, Pre-Proceedings of The 3rd International Conference on Information Security and Cryptology (ICISC00), pp. 167–176, 2000.
M. Bellare and P. Rogaway, “Optimal asymmetric encryption”, Eurocrypt’94, LNCS, Springer-Verlag, 1995.
E. Biham and A. Shamir, “Differential cryptanalysi of DES-like cryptosystems”, Journal of Cryptology, Vol. 4, No. 1, pp. 3–72, 1991.
E. Biham, R. Anderson and L. Knudsen, “Serpent: a proposal for the advanced encryption standard”, http://www.cl.cam.ac.uk/~rja14/serpent.html.
D. Boneh and G. Durfee, “Cryptanalysis of RSA with private key d less than N0.292”, Eurocrypt’99, pp. 1–11, Springer-Verlag, 1999.
D. Boneh, R. DeMillo, and R. Lipton, “On the importantance of checking cryptographic protocols for faults”, in Proc of Eurocrypt’97, LNCS 1233, Springer-Verlag, pp. 37–51, 1997.
D. Boneh and J. Shaw, “Collusion-secure fingerprinting for digital data”, Crypto’95, LNCS, pp. 452–465, Springer-Verlag, 1995.
J. Coron, “Risistance against differential power analysis for elliptic curve cryptosystems”, Proc. Of CHES’99, LNCS 1717, Springer-Verlag, pp. 292–302, 1999.
B. Chor and N. Gilboa, “Computational private information retrieval”, Proc. of 29th STOC, pp. 304–313, 1997.
B. Chor, O. Goldreich, E. Kushilevita, and M. Sudan, “Private information retrieval”, Proc. of 36th FOCS, pp. 41–50, 1995.
J. Coron, P. Kocher, and D. Naccache, “Statistics and secret leaksge”, to appear in the Proceedings of Financial Cryptography 01, LNCS, Springer-Verlag.
I.J. Cox, J.P.M.G. Linnartz, “Some general methods for tampering with watermarks”, in IEEE international Conference on Image Processing”, 1997.
C. Cachin, S. Micali, and M. Stadler, “Computationally Private Information Retrieval with Polylogrithmic Communication”, in Proceedings of Eurocrypt’99, LNCS, Springer-Verlag, pp. 402–414, 1999.
S. Craver, N. Memon, B. Yeo, M. Yeung, “Can invisible watermarks resolve rightful ownership”, IBM Research Report, RC 20509, July 25, 1996.
J. Coron, D. Naccache and J. Stern, “On the security of RSA padding”, Crypto’99, pp. 1–18, Springer-Verlag, 1999.
D. Coppersmith, D. Wagner, B. Schneier and J. Kelsey, “Cryptanalysis of TWOPRIMES”, Proceedings of FSE’98, LNCS, Springer-Verlag, 1998.
W. Dai, “Speed benchmarks of various ciphers and hash functions”, http://www.eskimo.com/~weidai/benchmarks.html.
Y. Gertner, Y. Ishai, E. Kushilevita and T. Malkin, “Protecting data privacy in private information retrieval schemes”, Proc. of 30th STOC, 1998.
C. Griwodz, O. Merkel, J. Dittmann, R. Steinmetz, “Protecting VoD the Easier Way”, ACM Multimedia’ 98, pp. 21–28, Bristol, UK, 1998.
H. Handschun, P. Paillier, and J. Stern, “Probing attacks on tamper-resisyant devices”, Proc. Of CHES’99, LNCS 1717, Springer-Verlag, pp. 303–315, 1999.
R. Jain, “The convergence of PCs and TV”, IEEE Multimedia, October/December 1999.
M. Joye, J.-J. Quisquater, F. Bao, and R.H. Deng, “RSA-type signatures in the presence of transient faults”, In M. Darnell, editor, Cryptography and Coding, Vol. 1355 of Lecture Notes in Computer Science, pp. 155–160, Springer-Verlag, 1997.
L. R. Knudsen, “The block cipher lounge—AES”, http://www.ii.uib.no/~larsr/aes.html.
E. Kushilevita and R. Ostrovsky, “Single-database computationally private information retrieval”, Proc. Of 38th FOCS, 1997.
P. Kocher, http://www.cryptography.com/resources/
M. Matsui, “Linear cryptanalysis method for DES cipher”, Proceedings of Eurocrypt’93, LNCS 765, Springer-Verlag, pp. 386–397, 1994.
Video Dialtone Technology, McGraw-Hill, 1995.
B. M. Macq and J-J Quisquater, “Cryptology for digital TV broadcasting”, Proceedings of the IEEE, Vol. 83, No, 6, pp. 944–957, 1995.
T. Maples and G. Spanos, “Performance study of a selective Encryption scheme for security of networked, real-time video”, Proc. of the 4th International Conference on Computer and Communications and Networks, Las Vegas, Nevada, Sept, 1995.
T. Okamoto and S. Uchiyama, “A new public-key cryptosystem as secure as factoring”, Proceedings of Eurocrypt’98, LNCS, Springer-Verlag, 1998.
B. Pfitzmann and M. Shunter, “Asymmetric fingerprinting”, Eurocrypt’96, LNCS 1070, pp. 84–95, Springer-Verlag, 1996.
B. Pfitzmann and A. Sadeghi, “Coin-based anonymous fingerprinting”, Eurocrypt’99, pp. 150-164, Springer-Verlag, 1999.
L. Qiao, K. Nahrstedt and I. Tarn, “Is MPEG encryption using random lists instead of Zig Zag Order”, IEEE International Symposium on Consumer Electronics, Dec, 1997.
R. A. Rueppel, Analysis and Design of Stream Ciphers, Springer-Verlag, 1986.
L. Tang, “Methods for Encrypting and decrypting MPEG video data efficiently”, Proc. of the 4th ACM Multimedia Conference, Boston, MA, November, 1996.
M. Wiener, “Cryptanalysis of short RSA secret exponents”, IEEE Transactions on Information Theory, Vol. 36, No. 3, pp. 553–558, 1990.
H. Wu, F. Bao, D. Ye, R. Deng, “Cryptoanalysis of the m-permutation protection schemes”, Proc. of ACISP2000, LNCS 1841, Springer-Verlag, pp. 97–111, 2000.
J. Zhao and E. Koch, “Embedding robust label into images for copyright protection”, Proceedings of the International Conference on Intellectual Property Rights for Specialized Information, Knowledge and New Technologies, Austria, Aug. 21–25, 1995.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bao, F., Deng, R., Feng, P., Guo, Y., Wu, H. (2001). Secure and Private Distribution of Online Video and Some Related Cryptographic Issues. In: Varadharajan, V., Mu, Y. (eds) Information Security and Privacy. ACISP 2001. Lecture Notes in Computer Science, vol 2119. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-47719-5_17
Download citation
DOI: https://doi.org/10.1007/3-540-47719-5_17
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-42300-3
Online ISBN: 978-3-540-47719-8
eBook Packages: Springer Book Archive