Skip to main content

Secure and Private Distribution of Online Video and Some Related Cryptographic Issues

  • Conference paper
  • First Online:
Information Security and Privacy (ACISP 2001)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2119))

Included in the following conference series:

Abstract

With the rapid growth of broadband infrastructure, it is thought that the bottleneck for video-on-demand service through Internet is being cleared. However, digital video content protection and consumers privacy protection emerge as new major obstacles. In this paper we propose an online video distribution system with strong content security and privacy protection. We mainly focus on the study of security and privacy problems related to the system. Besides presenting the new system, we intensively discuss some relevant cryptographic issues, such as content protection, private information retrieval, super-speed encryption/decryption for video, and PKC with fast decryption etc. The paper can be viewed as one that proposes practical solutions to real life problems, as well as one that presents applied cryptography research.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. R. Anderson and M. Kuhn, “Low cost attacks on tamper resistant devices”, in Security protocols: International Workshop’97, LNCS 1361, Springer-Verlag, pp. 125–136, 1997.

    Chapter  Google Scholar 

  2. F. Bao, R. Deng, P. Feng, “An efficient and practical scheme for privacy protection in e-commerce of digital goods”, Pre-Proceedings of The 3rd International Conference on Information Security and Cryptology (ICISC00), pp. 167–176, 2000.

    Google Scholar 

  3. M. Bellare and P. Rogaway, “Optimal asymmetric encryption”, Eurocrypt’94, LNCS, Springer-Verlag, 1995.

    Google Scholar 

  4. E. Biham and A. Shamir, “Differential cryptanalysi of DES-like cryptosystems”, Journal of Cryptology, Vol. 4, No. 1, pp. 3–72, 1991.

    Article  MATH  MathSciNet  Google Scholar 

  5. E. Biham, R. Anderson and L. Knudsen, “Serpent: a proposal for the advanced encryption standard”, http://www.cl.cam.ac.uk/~rja14/serpent.html.

  6. D. Boneh and G. Durfee, “Cryptanalysis of RSA with private key d less than N0.292”, Eurocrypt’99, pp. 1–11, Springer-Verlag, 1999.

    Google Scholar 

  7. D. Boneh, R. DeMillo, and R. Lipton, “On the importantance of checking cryptographic protocols for faults”, in Proc of Eurocrypt’97, LNCS 1233, Springer-Verlag, pp. 37–51, 1997.

    Google Scholar 

  8. D. Boneh and J. Shaw, “Collusion-secure fingerprinting for digital data”, Crypto’95, LNCS, pp. 452–465, Springer-Verlag, 1995.

    Google Scholar 

  9. J. Coron, “Risistance against differential power analysis for elliptic curve cryptosystems”, Proc. Of CHES’99, LNCS 1717, Springer-Verlag, pp. 292–302, 1999.

    Google Scholar 

  10. B. Chor and N. Gilboa, “Computational private information retrieval”, Proc. of 29th STOC, pp. 304–313, 1997.

    Google Scholar 

  11. B. Chor, O. Goldreich, E. Kushilevita, and M. Sudan, “Private information retrieval”, Proc. of 36th FOCS, pp. 41–50, 1995.

    Google Scholar 

  12. J. Coron, P. Kocher, and D. Naccache, “Statistics and secret leaksge”, to appear in the Proceedings of Financial Cryptography 01, LNCS, Springer-Verlag.

    Google Scholar 

  13. I.J. Cox, J.P.M.G. Linnartz, “Some general methods for tampering with watermarks”, in IEEE international Conference on Image Processing”, 1997.

    Google Scholar 

  14. C. Cachin, S. Micali, and M. Stadler, “Computationally Private Information Retrieval with Polylogrithmic Communication”, in Proceedings of Eurocrypt’99, LNCS, Springer-Verlag, pp. 402–414, 1999.

    Google Scholar 

  15. S. Craver, N. Memon, B. Yeo, M. Yeung, “Can invisible watermarks resolve rightful ownership”, IBM Research Report, RC 20509, July 25, 1996.

    Google Scholar 

  16. J. Coron, D. Naccache and J. Stern, “On the security of RSA padding”, Crypto’99, pp. 1–18, Springer-Verlag, 1999.

    Google Scholar 

  17. http://www.tandem.com/brfs_wps/esscpttb/esscpttb.htm

  18. D. Coppersmith, D. Wagner, B. Schneier and J. Kelsey, “Cryptanalysis of TWOPRIMES”, Proceedings of FSE’98, LNCS, Springer-Verlag, 1998.

    Google Scholar 

  19. W. Dai, “Speed benchmarks of various ciphers and hash functions”, http://www.eskimo.com/~weidai/benchmarks.html.

  20. Y. Gertner, Y. Ishai, E. Kushilevita and T. Malkin, “Protecting data privacy in private information retrieval schemes”, Proc. of 30th STOC, 1998.

    Google Scholar 

  21. C. Griwodz, O. Merkel, J. Dittmann, R. Steinmetz, “Protecting VoD the Easier Way”, ACM Multimedia’ 98, pp. 21–28, Bristol, UK, 1998.

    Google Scholar 

  22. H. Handschun, P. Paillier, and J. Stern, “Probing attacks on tamper-resisyant devices”, Proc. Of CHES’99, LNCS 1717, Springer-Verlag, pp. 303–315, 1999.

    Google Scholar 

  23. R. Jain, “The convergence of PCs and TV”, IEEE Multimedia, October/December 1999.

    Google Scholar 

  24. M. Joye, J.-J. Quisquater, F. Bao, and R.H. Deng, “RSA-type signatures in the presence of transient faults”, In M. Darnell, editor, Cryptography and Coding, Vol. 1355 of Lecture Notes in Computer Science, pp. 155–160, Springer-Verlag, 1997.

    Chapter  Google Scholar 

  25. L. R. Knudsen, “The block cipher lounge—AES”, http://www.ii.uib.no/~larsr/aes.html.

  26. E. Kushilevita and R. Ostrovsky, “Single-database computationally private information retrieval”, Proc. Of 38th FOCS, 1997.

    Google Scholar 

  27. P. Kocher, http://www.cryptography.com/resources/

  28. M. Matsui, “Linear cryptanalysis method for DES cipher”, Proceedings of Eurocrypt’93, LNCS 765, Springer-Verlag, pp. 386–397, 1994.

    Google Scholar 

  29. Video Dialtone Technology, McGraw-Hill, 1995.

    Google Scholar 

  30. B. M. Macq and J-J Quisquater, “Cryptology for digital TV broadcasting”, Proceedings of the IEEE, Vol. 83, No, 6, pp. 944–957, 1995.

    Article  Google Scholar 

  31. T. Maples and G. Spanos, “Performance study of a selective Encryption scheme for security of networked, real-time video”, Proc. of the 4th International Conference on Computer and Communications and Networks, Las Vegas, Nevada, Sept, 1995.

    Google Scholar 

  32. T. Okamoto and S. Uchiyama, “A new public-key cryptosystem as secure as factoring”, Proceedings of Eurocrypt’98, LNCS, Springer-Verlag, 1998.

    Google Scholar 

  33. B. Pfitzmann and M. Shunter, “Asymmetric fingerprinting”, Eurocrypt’96, LNCS 1070, pp. 84–95, Springer-Verlag, 1996.

    Google Scholar 

  34. B. Pfitzmann and A. Sadeghi, “Coin-based anonymous fingerprinting”, Eurocrypt’99, pp. 150-164, Springer-Verlag, 1999.

    Google Scholar 

  35. L. Qiao, K. Nahrstedt and I. Tarn, “Is MPEG encryption using random lists instead of Zig Zag Order”, IEEE International Symposium on Consumer Electronics, Dec, 1997.

    Google Scholar 

  36. R. A. Rueppel, Analysis and Design of Stream Ciphers, Springer-Verlag, 1986.

    Google Scholar 

  37. L. Tang, “Methods for Encrypting and decrypting MPEG video data efficiently”, Proc. of the 4th ACM Multimedia Conference, Boston, MA, November, 1996.

    Google Scholar 

  38. M. Wiener, “Cryptanalysis of short RSA secret exponents”, IEEE Transactions on Information Theory, Vol. 36, No. 3, pp. 553–558, 1990.

    Article  MATH  MathSciNet  Google Scholar 

  39. H. Wu, F. Bao, D. Ye, R. Deng, “Cryptoanalysis of the m-permutation protection schemes”, Proc. of ACISP2000, LNCS 1841, Springer-Verlag, pp. 97–111, 2000.

    Google Scholar 

  40. J. Zhao and E. Koch, “Embedding robust label into images for copyright protection”, Proceedings of the International Conference on Intellectual Property Rights for Specialized Information, Knowledge and New Technologies, Austria, Aug. 21–25, 1995.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bao, F., Deng, R., Feng, P., Guo, Y., Wu, H. (2001). Secure and Private Distribution of Online Video and Some Related Cryptographic Issues. In: Varadharajan, V., Mu, Y. (eds) Information Security and Privacy. ACISP 2001. Lecture Notes in Computer Science, vol 2119. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-47719-5_17

Download citation

  • DOI: https://doi.org/10.1007/3-540-47719-5_17

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-42300-3

  • Online ISBN: 978-3-540-47719-8

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics