Abstract
In Chapter 4 we put forth the notion of winnable revocation games. Winning a sequence of such games implies that the adversary can be eventually disabled by the tracer. Nevertheless, the fact that the adversary can be disabled does not necessarily imply that a certain leaking incident, i.e., an incident where some key material of some users are exposed to the adversary, can be simultaneously contained. This is due to the fact that a leaking incident enables possibly the creation of a sequence of adversaries that may have to be successively revoked (in a succession of many revocation games). This gives rise to the notion of an evolving adversary which is the subject of this chapter.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2010 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
Kiayias, A., Pehlivanoglu, S. (2010). Pirate Evolution. In: Encryption for Digital Content. Advances in Information Security, vol 52. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-0044-9_5
Download citation
DOI: https://doi.org/10.1007/978-1-4419-0044-9_5
Published:
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4419-0043-2
Online ISBN: 978-1-4419-0044-9
eBook Packages: Computer ScienceComputer Science (R0)