Convertible Drm System Based on Identity-based Encryption
نویسندگان
چکیده
With the rapid growth of the Internet, acquiring digital contents over the Internet has become commonplace. Most traditional items can be translated into digital form. That is to say the digital contents can be distributed easily and rapidly to users over the Internet. Unfortunately, situations of piracy are common and become more serious, since the digital contents can be copied and distributed easily through Internet. Thus, Digital Rights Management (DRM) is a popular tool used to protect digital contents with cryptographic technology. But there are many different DRM encryption formats that are adopted by different content providers, causing consumers can’t play their contents on devices with different DRM format even though they bought it legally. In this paper, we employ identity-based encryption to allow a conversion between different DRM systems. Through the conversion process, the digital content can be used at different DRM systems and hold the legitimate use of the right.
منابع مشابه
Identity Based Drm System with Total Anonymity and Device Flexibility Using Ibes
Most of the Digital Rights Management (DRM) systems fail to cover all requirements like user anonymity, user fairness, security and others. Device based DRM systems, adopted by most providers, lack user fairness and mostly follow proprietary formats. On the contrary, Smart Card DRM systems satisfy user anonymity and fairness, but have certain vulnerabilities, as identified in this paper. We pro...
متن کاملNew identity-based key-insulated convertible multi-authenticated encryption scheme
Elaborating on the merits of convertible multi-authenticated encryption (CMAE) schemes and keyinsulated systems, we propose a novel identity-based key-insulated convertible multi-authenticated encryption scheme (IB-KI-CMAE), which can effectively reduce the impact caused by the key exposure. Our scheme allows each user to periodically update his private key while the corresponding public one re...
متن کاملUnlinkable Content Playbacks in a Multiparty DRM System
We present a solution to the problem of privacy invasion in a multiparty digital rights management scheme. (Roaming) users buy content licenses from a content provider and execute it at any nearby content distributor. Our approach, which does not need any trusted third party—in contrast to most related work on privacy-preserving DRM—is based on a re-encryption scheme that runs on any mobile And...
متن کاملNew Constructions of Convertible Undeniable Signature Schemes without Random Oracles
In Undeniable Signature, a signature’s validity can only be confirmed or disavowed with thehelp of an alleged signer via a confirmation or disavowal protocol. A Convertible undeniablesignature further allows the signer to release some additional information which can make anundeniable signature become publicly verifiable. In this work we introduce a new kind of attacks,called cl...
متن کاملA New Method for Encryption of Color Images based on Combination of Chaotic Systems
This paper presents a new method for encryption of color images based on a combination of chaotic systems, which makes the image encryption more efficient and robust. The proposed algorithm generated three series of data, ranged between 0 and 255, using a chaotic Chen system. Another Chen system was then started with different initial values, which were converted to three series of numbers from...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2009