Software piracy,illegal software duplication,seems to beas rampant as an epidemic disease all over the world andboth software publishers and government officials are frus-trated.The loss for the software publishers du...Software piracy,illegal software duplication,seems to beas rampant as an epidemic disease all over the world andboth software publishers and government officials are frus-trated.The loss for the software publishers due to the unau-thorized copying of computer programs amounted to ■1.6 bil-lion in the U.S.The figure could reach ■7.5 billion if over-seas markets were included.Some countries such as Italy展开更多
The Danube River basin was home to some of the world’s earliest human cultures such as the Danubian Neolithic cultures including the Linear Pottery culture. The Vucedol culture was famous for ceramics during the thir...The Danube River basin was home to some of the world’s earliest human cultures such as the Danubian Neolithic cultures including the Linear Pottery culture. The Vucedol culture was famous for ceramics during the third millennium BC. Early settlement required fortresses and castles to be built on the Danube River to defend the settlements from invading forces. These included the Persia, Roman and Ottoman empires. Cities included Vienna, Budapest, Belgrade and Ruse. The risks include stream capture, settlement, invasions, navigation, trade, pollution, industrial and urban wastewater, over fishing, food insecurity, locks and dams, shoreline erosion and flooding. The primary objective was to document the settlement history on the Danube River which became Eastern Europe’s pathway for settlement, invasions, navigation and trade in the Danube basin has put the river at risk for more than 2500 years. River capturing of the Danube by the Rhine River has reduced the length and flow of the Danube. The Danube River has had a huge economic, social and environmental impact on 10 European countries. However, with 10 countries sharing the river it has been difficult to manage and mitigate the risks and threats to the Danube River and its water quality.展开更多
In Crypto'05, Boneh et al. presented two broadcast encryption schemes. Their work has exciting achievements: the header (also called ciphertexts) and the private keys are of constant size. In their paper, they giv...In Crypto'05, Boneh et al. presented two broadcast encryption schemes. Their work has exciting achievements: the header (also called ciphertexts) and the private keys are of constant size. In their paper, they give an open question to construct a traitor tracing algorithm for their broadcast encryption schemes, and combine the two systems to obtain an efficient trace-and-revoke system. In this paper, we give a negative answer to their open question. More precisely, we show that three or more insider users are able to collude to forge a valid private key for pirate decoding against their schemes. Moreover, we prove that there exists no traitor tracing algorithm to identify the colluders. Our pirate decoding can also similarly be applied to Lee et al.'s broadcast encryption schemes in ISPEC'06.展开更多
In this paper we introduce an architecture for a multi-key pirate decoder which employs decryption keys from multiple traitors. The decoder has built-in monitoring and self protection functionalities and is capable of...In this paper we introduce an architecture for a multi-key pirate decoder which employs decryption keys from multiple traitors. The decoder has built-in monitoring and self protection functionalities and is capable of defeating most multiple-round based traitor tracing schemes such as the schemes based on the black-box confirmation method. In particular, the proposed pirate decoder is customized to defeat the private key and the public key fully collusion resistant traitor tracing (FTT) schemes, respectively. We show how the decoder prolongs a trace process so that the tracer has to give up his effort. FTT schemes are designed to identify all the traitors. We show that decoder enables the FTT schemes to identify at most 1 traitors. Finally, assuming the decoder is embedded with several bytes of memory, we demonstrate how the decoder is able to frame innocent users at will.展开更多
文摘Software piracy,illegal software duplication,seems to beas rampant as an epidemic disease all over the world andboth software publishers and government officials are frus-trated.The loss for the software publishers due to the unau-thorized copying of computer programs amounted to ■1.6 bil-lion in the U.S.The figure could reach ■7.5 billion if over-seas markets were included.Some countries such as Italy
文摘The Danube River basin was home to some of the world’s earliest human cultures such as the Danubian Neolithic cultures including the Linear Pottery culture. The Vucedol culture was famous for ceramics during the third millennium BC. Early settlement required fortresses and castles to be built on the Danube River to defend the settlements from invading forces. These included the Persia, Roman and Ottoman empires. Cities included Vienna, Budapest, Belgrade and Ruse. The risks include stream capture, settlement, invasions, navigation, trade, pollution, industrial and urban wastewater, over fishing, food insecurity, locks and dams, shoreline erosion and flooding. The primary objective was to document the settlement history on the Danube River which became Eastern Europe’s pathway for settlement, invasions, navigation and trade in the Danube basin has put the river at risk for more than 2500 years. River capturing of the Danube by the Rhine River has reduced the length and flow of the Danube. The Danube River has had a huge economic, social and environmental impact on 10 European countries. However, with 10 countries sharing the river it has been difficult to manage and mitigate the risks and threats to the Danube River and its water quality.
基金the National Natural Science Foundation of China (Grant Nos. 60303026, 60573030, and 60673077)
文摘In Crypto'05, Boneh et al. presented two broadcast encryption schemes. Their work has exciting achievements: the header (also called ciphertexts) and the private keys are of constant size. In their paper, they give an open question to construct a traitor tracing algorithm for their broadcast encryption schemes, and combine the two systems to obtain an efficient trace-and-revoke system. In this paper, we give a negative answer to their open question. More precisely, we show that three or more insider users are able to collude to forge a valid private key for pirate decoding against their schemes. Moreover, we prove that there exists no traitor tracing algorithm to identify the colluders. Our pirate decoding can also similarly be applied to Lee et al.'s broadcast encryption schemes in ISPEC'06.
文摘In this paper we introduce an architecture for a multi-key pirate decoder which employs decryption keys from multiple traitors. The decoder has built-in monitoring and self protection functionalities and is capable of defeating most multiple-round based traitor tracing schemes such as the schemes based on the black-box confirmation method. In particular, the proposed pirate decoder is customized to defeat the private key and the public key fully collusion resistant traitor tracing (FTT) schemes, respectively. We show how the decoder prolongs a trace process so that the tracer has to give up his effort. FTT schemes are designed to identify all the traitors. We show that decoder enables the FTT schemes to identify at most 1 traitors. Finally, assuming the decoder is embedded with several bytes of memory, we demonstrate how the decoder is able to frame innocent users at will.