SPIES: Secret Protection Incentive-based Escrow System

نویسندگان

  • N. Boris Margolin
  • Matthew K. Wright
  • Brian N. Levine
چکیده

Once electronic content has been released, it is very difficult to prevent perfect copies of the content from being widely distributed, which can cause economic harm to the content’s owner and others. We focus on content which is to be shared to a limited extent, which is valuable, and which only needs to be protected for a limited amount of time, such as trade secrets. For such content we provide an economic incentive to limit sharing, without using DRM or watermarking. In our protocol, a quantity of money is placed in escrow, and anyone can get a portion of it by providing proof of knowledge of the content. Since payments become smaller as more individuals give proof, it is in the interest of those with access to the content to prevent further sharing.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Analysis of Positive Incentives for Protecting Secrets in Digital Rights Management

A common problem to current DRM-based services that usually offer streaming digital content and support period pricing (monthly or yearly subscription) systems is how to prevent secret (e.g., account and password) sharing beyond authorized consumers. Traditional technical solutions such as binding the secrets with specific devices can only solve this problem to some extent at the cost of user’s...

متن کامل

Scalable Key - Escrow

We propose a cryptosystem that has an inherent key escrow mechanism. This leads us to propose a session based public verifiable key escrow system that greatly improves the amount of key material the escrow servers has to keep in order to decrypt an encryption. In our scheme the servers will only have a single secret sharing, as opposed to a single key from every escrowed player. This is done wh...

متن کامل

Two Classes of Robust Threshold Key Escrow Schemes

The definition of robust threshold key escrow scheme (RTKES) is proposed in this paper. Namely, in RTKES, malice escrow agency fail to obtain the system secret key or user’s secret key, even if the number of malice escrow agency is more than or equal to the value of threshold. Clearly, the problem of “user’s secret key completely depends on the trusted escrow agency” is solved if RTKES exists. ...

متن کامل

Certificateless Key-Insulated Encryption: Cryptographic Primitive for Achieving Key-Escrow Free and Key-Exposure Resilience

Certificateless encryption (CLE) alleviates the heavy certificate management in traditional public key encryption and the key escrow problem in the ID-based encryption simultaneously. Current CLE schemes assumed that the user’s secret key is absolutely secure. Unfortunately, this assumption is too strong in case the CLE is deployed in the hostile setting and the leakage of secret key is inevita...

متن کامل

Ciphertext-Policy Attribute based Data-Sharing with Enhanced Productivity and Security

Online data sharing systems and social networks provides security through the cryptographic solutions. For this, Cipher text Policy Attribute Based Encryption is mostly suitable for distributed data sharing systems since the data owner has full control to put in force access policies and updating the policies. Even if the CP-ABE has various advantages, it has a major drawback known as the Key E...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004