A Group Key Distribution System Based on the Generalized Aryabhata Remainder Theorem for Enterprise Digital Rights Management
نویسندگان
چکیده
Digital Rights Management (DRM) is a type of access-control technology that is used by diverse content providers to restrict the use of digital content. Enterprise Digital Rights Management (E-DRM) is an application of DRM techniques for managing the control of access to sensitive documents in an enterprise. In this paper, we propose a group key distribution system for E-DRM based on the concept of a secret-sharing mechanism and the generalized Aryabhata remainder theorem (GART). To the best of our knowledge, no previous publications related to E-DRM technologies have presented the group key distribution system that we propose. In our system, different groups of enterprise members within the enterprise obtain different digital content in parallel without collision by using their group’s unique session key; all members within each group share a common session key to decrypt the same digital documents to acquire the correct content. We proved that our system achieves the goal of providing high security, which includes preventing inside and outside attacks and offering forward and backward secrecy.
منابع مشابه
An Access Control Mechanism Based on the Generalized Aryabhata Remainder Theorem
An access control mechanism is a technology to protect the confidential files stored in a database by restricting the access rights of different approved users of these files. In this paper, we propose a novel access control mechanism using the single-key-lock system and the generalized Aryabhata remainder theorem (GART), in which each user is associated with a key and each digital file with a ...
متن کاملA Database Encryption Scheme Based on the Generalized Aryabhata Remainder Theorem
Database security prevents the disclosure of confidential data within a database to unauthorized users, and has become an urgent challenge for a tremendous number of database applications. Data encryption is a widely-used cryptographic technique for realizing database security in which the data kept in the database are encrypted into ciphertext. Inspired by Lin et al.’s database encryption syst...
متن کاملمدیریت کلید در سیستمهای مدیریت حقوق دیجیتال در حالت برونخطی
By expanding application of digital content in the world of information technology, supervision and control over the data, and also preventing the copy of documents is considered. In this relation digital rights management systems are responsible for the secure distribution of digital content, and for this purpose the common functions in the field of cryptography and utilize Digital watermarkin...
متن کاملAn authenticated group key distribution mechanism using theory of numbers
A group key distribution protocol can enable members of a group to share a secret group key and use it for secret communications. In 2010, Harn and Lin proposed an authenticated group key distribution protocol using polynomial-based secret sharing scheme. Recently, Guo and Chang proposed a similar protocol based on the generalized Chinese remainder theorem. In this paper, we point out that ther...
متن کاملEnforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version)
One of the security issues in data outsourcing is the enforcement of the data owner’s access control policies. This includes some challenges. The first challenge is preserving confidentiality of data and policies. One of the existing solutions is encrypting data before outsourcing which brings new challenges; namely, the number of keys required to access authorized resources, efficient policy u...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014