Towards Privacy Preserving Digital Rights Management Using Oblivious Transfer
نویسندگان
چکیده
Digital Rights Management (DRM) is a hot topic in digital content development. Many implementations invade users’ privacy by revealing what contents they have purchased. Preserving user’s privacy during purchasing content is necessary without doubt. Some works address the problem by providing anonymity to the user. Anonymous trade would not allow the shopkeepers to manage his customers efficiently. Also, the identities of users can still be profiled via side channels like routing paths or IP addresses. In this paper, we propose a scheme to preserve users’ privacy by hiding the users’ choices of contents from the shopkeepers using oblivious transfer (OT). We will evaluate our scheme in the aspects of security, performance, comparison, and implementation. A privacy measurement called “Privacity” is also firstly defined.
منابع مشابه
A Privacy-Preserving Buyer-Seller Watermarking Protocol Based on Priced Oblivious Transfer
Buyer-seller watermarking protocols allow copyright protection of digital goods. To protect privacy, some of those protocols provide buyers with anonymity. However, anonymous e-commerce protocols pose several disadvantages, like hindering customer management or requiring anonymous payment mechanisms. Additionally, no existing buyer-seller watermarking protocol provides fair exchange. We propose...
متن کاملPrivacy Preserving Techniques for Speech Processing
Speech is perhaps the most private form of personal communication but current speech processing techniques are not designed to preserve the privacy of the speaker and require complete access to the speech recording. We propose to develop techniques for speech processing which do preserve privacy. While our proposed methods can be applied to a variety of speech processing problems and also gener...
متن کاملKeyword Search and Oblivious Pseudorandom Functions
We study the problem of privacy-preserving access to a database. Particularly, we consider the problem of privacy-preserving keyword search (KS), where records in the database are accessed according to their associated keywords and where we care for the privacy of both the client and the server. We provide efficient solutions for various settings of KS, based either on specific assumptions or o...
متن کاملDesign and Analysis of Privacy-Preserving Protocols
More and more of our daily activities are using the Internet to provide an easy way to get access to instant information. The equipment enabling these interactions is also storing information such as: access time, where you are, and what you plan to do. The ability to store this information is very convenient but is also the source of a major concern: once data are stored, it must be protected....
متن کاملControlling Access to an Oblivious Database Using Stateful Anonymous Credentials
In this work, we consider the task of allowing a content provider to enforce complex access control policies on oblivious protocols conducted with anonymous users. As our primary application, we show how to construct privacy-preserving databases by combining oblivious transfer with an augmented anonymous credential system. This permits a database operator to restrict which items each user may a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006