On Cryptographic Techniques for Digital Rights Management

نویسندگان

  • Nelly Fazio
  • Yevgeniy Dodis
  • Aggelos Kiayias
  • Anna Lysyanskaya
  • Antonio Nicolosi
  • Duong Hieu Phan
  • Danfeng Yao
چکیده

With more and more content being produced, distributed, and ultimately rendered and consumed in digital form, devising effective Content Protection mechanisms and building satisfactory Digital Rights Management (DRM) systems have become top priorities for the Publishing and Entertaining Industries. To help tackle this challenge, several cryptographic primitives and constructions have been proposed, including mechanisms to securely distribute data over a unidirectional insecure channel (Broadcast Encryption), schemes in which leakage of cryptographic keys can be traced back to the leaker (Traitor Tracing), and techniques to combine revocation and tracing capabilities (Trace-and-Revoke schemes). In this thesis, we present several original constructions of the above primitives, which improve upon existing DRM-enabling cryptographic primitives along the following two directions: (1) Widening their scope of applicability e.g., by considering models taking into accounts usability issues typical of the DRM setting; and (2) Strengthening their security guarantees to higher levels that are standards, for example, in the case of standalone encryption. Our results along the first line of work include the following: • An efficient public-key broadcast encryption scheme, which allows mutually mistrusting content providers to leverage a common delivery infrastructure, and can cope with low-end, stateless receivers; • A traitor tracing scheme with optimal transmission rate, in which encryption does not cause a blow-up in the size of the content, thus allowing for optimal utilization

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

مدیریت کلید در سیستم‌های مدیریت حقوق دیجیتال در حالت برون‌خطی

By expanding application of digital content in the world of information technology, supervision and control over the data, and also preventing the copy of documents is considered. In this relation digital rights management systems are responsible for the secure distribution of digital content, and for this purpose the common functions in the field of cryptography and utilize Digital watermarkin...

متن کامل

Analyzing research trends on digital rights management

Background and Aim: Current study has investigated the status of research about digital rights management and to identify the gaps and research trends in the field. Methods: Using a narrative review approach major databases such as Elsevier, Springer, Emerald, ProQuest, etc. were searched for the term “Digital Rights Management”. Results: Following the preliminary analysis, 80 research sources ...

متن کامل

Digital Identity Protection - Concepts and Issues

Tools and techniques for digital identity management represent an important technology for enabling transactions and interactions across the Internet. Because identity information is often privacy sensitive, it is important that suitable privacy and security techniques be adopted for its protection. In this paper we discuss relevant concepts and issues and survey an approach based on the notion...

متن کامل

Using Digital Right Management technology in IRANDOC ETD System

Background and Aim: Easing the probability of violation of intellectual property rights and unauthorized access of digital resources is one of the most important consequences of  information and communication technologies like Internet. The purpose of this research is to identify the state of Using Digital Right Management technology in IRANDOC ETD system. Method: This research is an applied re...

متن کامل

A cryptographic watermarking technique for multimedia signals

Digital watermarking has been widely used in digital rights management and copyright protection. In this paper, new cryptographic watermark schemes are proposed. Compare to the existing watermarking techniques, our proposed watermark schemes combine both security and efficiency that none of the existing schemes can do. We first develop an algorithm to randomly generate the watermark indices bas...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006