Innovative techniques to securely broadcast content to large groups of users over an insecure channel with applications to pay TV, wireless networks, military radio communications and Galileo.
Who can I contact?
|Start:||December 23, 2009|
|End:||December 22, 2013|
Total cost of €3,06 Million (€1.03 Million ANR-funded)
- 12th Research Group Meeting, from Monday 19th of December, 2011 until Monday 12th of December, 2011
The new encryption technology for content distribution.
STONE is the industry’s first efficient cryptographic solution that enables CAS vendors and content providers to identify and remotely disable compromised smart cards used by pirate emulators. A smart card implementation of STONE is in preparation.
Security by design is not an abstract concept.
Beware of alleged "military grade secure" products. It is one thing to use AES-256 or RSA-4096, using it correctly is a different kettle of fish.
We can help you build innovative products that require any standard or advanced cryptographic tools, such as elliptic curves, identity-based encryption, anonymous signatures, e-cash, DRM, Pay-TV and many others.
One of the goals of cryptography is to achieve systems for secure telecommunications. A variety of efficient standard protocols are implemented in the case of “one-to-one” communications. In the case of “one to many” (a.k.a. broadcast) communications however, most of existing solutions are either insecure (thus leading to massive fraud) or dramatically inefficient e.g. based on a naive re-iteration of a core protocol with each and every receiver. In this project, we address the problem of securely and efficiently broadcasting digital contents from a service center to a large group of users over an insecure channel. This problem is at the core of pay TV systems, on-demand video broadcast (VOD), mobile TV, wireless networks, military radio communications, positioning systems (GPS, Galileo), to quote a few. Two kinds of protocols are to be distinguished:
- broadcast encryption, which deals with controlling access to the content, and
- traitor tracing, which intends to recover the identity of dishonest users who provided their secret decryption key(s) to grant access to unauthorized entities.
The main focus of BEST is broadcast encryption cryptographic technologies. Finding hybrid solutions achieving both goals is also of high interest, but the way the two functionalities are to be integrated may depend on the targeted applications. For instance, commercial pay TV systems may typically desire a cost-effective protocol which allows to broadcast contents to a set of users which evolves dynamically (as opposed to static user groups). However, positioning systems such as Galileo may require that pirates be identified only with white-box tracing while ensuring the ability to revoke any user anytime. The innovative mechanisms invented and put forward through BEST find applications to a wide number of business use cases.
OBJECTIVES AND EXPECTED OUTCOMES
The overall goal of BEST is
- to come to a complete understanding of security requirements arising from target markets (based on industrial experience),
- to capture them in terms of security models (using provable security),
- to relate them to state-of-the-art cryptographic techniques (such as bilinear maps),
- to invent new mechanisms for broadcast encryption and applications related to it,
- to realize novel cryptographic functionalities and improve current services or suggest new ones based on these,
- to specify a complete broadcast encryption system and subsequently build a prototype.
A particular care is taken to minimize complexity and reach cost-effective solutions: here, performances relate to the computation time and memory storage on the receiver side and, above all, to the total size of transmitted data. Although BEST includes theoretical research aspects, it is mainly oriented towards industrial research.