Nothing Special   »   [go: up one dir, main page]

Skip to main content

Encryption for Digital Content

  • Book
  • © 2010

Overview

  • First book to combine exposition of underlying mathematics, attack models and parameter analysis
  • Includes a complete description of broadcast encryption with various revocation and tracing functionalities
  • Provides a solid treatment on this subject
  • Includes supplementary material: sn.pub/extras

Part of the book series: Advances in Information Security (ADIS, volume 52)

This is a preview of subscription content, log in via an institution to check access.

Access this book

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

eBook USD 15.99 USD 84.99
Discount applied Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

About this book

Cryptography is an area that traditionally focused on secure communication, authentication and integrity. In recent times though, there is a wealth of novel  fine-tuned cryptographic techniques that sprung up as cryptographers focused on the specialised problems that arise in digital content distribution. These include fingerprinting codes, traitor tracing, broadcast encryption and others. This book is an introduction to this new generation of cryptographic mechanisms as well as an attempt to provide a cohesive presentation of these techniques.

Encryption for Digital Content details the subset cover framework (currently used in the AACS encryption of Blu-Ray disks), fingerprinting codes, traitor tracing schemes as well as related security models and attacks.   It provides an extensive treatment of the complexity of the revocation problem for multi-receiver (subscriber) encryption mechanisms, as well as the complexity of the traceability problem. Pirate evolution type of attacks are covered in depth. This volume also illustrates the manner that attacks affect parameter selection, and how this impacts implementations. The authors gratefully acknowledge the support of the National Science Foundation under Grant No. 0447808.

Similar content being viewed by others

Keywords

Table of contents (5 chapters)

Reviews

From the reviews:

“This book provides several cryptographic mechanisms for protecting digital content. … With the necessary prerequisites, even readers with no prior knowledge of cryptography can gain a basic understanding of this field. … each chapter ends with a detailed bibliographic note, which is useful for further study. The book is based in part on Pehlivanoglu’s doctoral thesis, which implies that it will provide a state-of-the-art overview of encryption for digital content. … Overall, I recommend this survey of digital content encryption for cryptographers and professional engineers.” (Zheng Gong, ACM Computing Reviews, May, 2011)

Authors and Affiliations

  • University of Athens, Department of Informatics, National and Kapodistrian, Ilisia, Athens, Greece

    Aggelos Kiayias

  • , School of Physical & Mathematical, Nanyang Technological University, Nanyang, Singapore

    Serdar Pehlivanoglu

Bibliographic Information

Publish with us