General digital rights management solution based on white-box cryptography

被引:0
|
作者
Liu Jun [1 ]
Hu Yupu [1 ]
Chen Jie [1 ]
机构
[1] School of Telecommunications Engineering, Xidian University
关键词
D O I
10.19682/j.cnki.1005-8885.2021.0006
中图分类号
TM614 [风能发电];
学科分类号
0807 ;
摘要
Digital rights management(DRM) applications are usually confronted with threats like key extraction, code lifting, and illegal distribution. White-box cryptography aims at protecting software implementations of cryptographic algorithms and can be employed into DRM applications to provide security. A general DRM solution based on white-box cryptography was proposed to address the three threats mentioned above. The method is to construct a general perturbation-enabled white-box compiler for lookup-table based white-box block ciphers, such that the white-box program generated by this compiler provides traceability along with resistance against key extraction and code lifting. To get a traceable white-box program, the idea of hiding a slight perturbation in the lookup-table was employed, aiming at perturbing its decryption functionality, so that each user can be identified. Security analysis and experimental results show that the proposed DRM solution is secure and practical.
引用
收藏
页码:52 / 63
页数:12
相关论文
共 50 条
  • [1] General digital rights management solution based on white-box cryptography
    Jun, Liu
    Yupu, Hu
    Jie, Chen
    [J]. Journal of China Universities of Posts and Telecommunications, 2021, 28 (01): : 52 - 63
  • [2] Opportunities in White-Box Cryptography
    Michiels, Wil
    [J]. IEEE SECURITY & PRIVACY, 2010, 8 (01) : 64 - 67
  • [3] White-box cryptography and an AES implementation
    Chow, S
    Eisen, P
    Johnson, H
    Van Orschot, PC
    [J]. SELECTED AREAS IN CRYPTOGRAPHY, 2003, 2595 : 250 - 270
  • [4] On the security goals of white-box cryptography
    Bock, Estuardo Alpirez
    Amadori, Alessandro
    Brzuska, Chris
    Michiels, Wil
    [J]. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2020, 2020 (02): : 327 - 357
  • [5] On the Linear Transformation in White-Box Cryptography
    Lee, Seungkwang
    Jho, Nam-Su
    Kim, Myungchul
    [J]. IEEE ACCESS, 2020, 8 : 51684 - 51691
  • [6] White-Box Cryptography: Security in an Insecure Environment
    Beunardeau, Marc
    Connolly, Aisling
    Geraud, Remi
    Naccache, David
    [J]. IEEE SECURITY & PRIVACY, 2016, 14 (05) : 88 - 92
  • [7] Towards Security Notions for White-Box Cryptography
    Saxena, Amitabh
    Wyseur, Brecht
    Preneel, Bart
    [J]. INFORMATION SECURITY, PROCEEDINGS, 2009, 5735 : 49 - +
  • [8] Discussion on the theoretical results of white-box cryptography
    Tingting LIN
    Xuejia LAI
    Weijia XUE
    Geshi HUANG
    [J]. Science China(Information Sciences), 2016, 59 (11) : 5 - 15
  • [9] Discussion on the theoretical results of white-box cryptography
    Lin, Tingting
    Lai, Xuejia
    Xue, Weijia
    Huang, Geshi
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2016, 59 (11)
  • [10] Research on disturbing white-box cryptography algorithm based on local differential privacy
    Luo, Wenjun
    Lai, Die
    Dai, Zesen
    [J]. SECURITY AND PRIVACY, 2023, 6 (06):