Content deleted Content added
m →Security: Fixed cite error |
|||
Line 20:
The approach of AACS provisions each individual player with a unique set of decryption keys which are used in a [[broadcast encryption]] scheme. This approach allows licensors to "revoke" individual players, or more specifically, the decryption keys associated with the player. Thus, if a given player's keys are compromised and published, the AACS LA can simply revoke those keys in future content, making the keys/player useless for decrypting new titles.
AACS also incorporates [[traitor tracing]] techniques. The standard allows for multiple versions of short sections of a movie to be encrypted with different keys, while a given player will only be able to decrypt one version of each section. The manufacturer embeds varying [[Digital watermarking|digital watermarks]] (such as [[Cinavia]]) in these sections, and upon subsequent analysis of the pirated release the compromised keys can be identified and revoked (this feature is called ''Sequence keys'' in the AACS specifications).<ref>{{cite web
| author = Hongxia Jin |author2=Jeffery Lotspiech |author3-link=Nimrod Megiddo |author3=Nimrod Megiddo
| title = Efficient Traitor Tracing
|