A lightweight and anonymous copyright-protection protocol

نویسندگان

  • Tzungher Chen
  • Gwoboa Horng
چکیده

Gradually, copyright-protection protocols have attracted much attention in that they provide effective copyright protection mechanisms. Asymmetric copyright-protection protocols allow the buyer to know and possess the protected content yet the seller has no idea about it. Subsequently, if an illegal copy is found, the seller can identify the buyer by cooperating with a trusted third party. Most copyright-protection protocols adopt public-key cryptosystems to achieve asymmetry. However, both encryption and decryption of multimedia based on public-key cryptosystems have the drawbacks of requiring high computational complexity and suffering from the burden of maintaining Public Key Infrastructure. Hence, enhancement and further development of these protocols are both necessary and central to the development of future ecommerce. In this paper, a lightweight copyright-protection protocol, benefiting from combining secret-key cryptosystems and a tamper-resistant device, is proposed to provide not only asymmetry of the protocol but also transaction anonymity of the buyer. Since the tamper-resistant device, generally speaking, provides a higher security level and is more and more commonly used, the schemes based on a tamper-resistant device are more practical than before. Moreover, the proposed protocol is computationally efficient and the key management is simple. © 2006 Elsevier B.V. All rights reserved.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Privacy-Preserving Buyer-Seller Watermarking Protocol Based on Priced Oblivious Transfer

Buyer-seller watermarking protocols allow copyright protection of digital goods. To protect privacy, some of those protocols provide buyers with anonymity. However, anonymous e-commerce protocols pose several disadvantages, like hindering customer management or requiring anonymous payment mechanisms. Additionally, no existing buyer-seller watermarking protocol provides fair exchange. We propose...

متن کامل

GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication

Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...

متن کامل

Game-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags

The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...

متن کامل

LEBRP - A Lightweight and Energy Balancing Routing Protocol for Energy-Constrained Wireless Ad Hoc Networks

A wireless ad hoc network typically refers to any set of wireless networks where all devices have equal status on a network and are free to associate with any other wireless ad hoc network devices in their range. As the nature of these networks, they commonly do not have external power supplies, and each node has a limited internal power source. In this paper, we put forward a new routing proto...

متن کامل

Lightweight Anonymous Routing for Reliability in Mobile Ad-Hoc Networks

Mobile ad-hoc networks (MANET) are particularly vulnerable on account of their intrinsic characteristics of open medium, dynamic topology, absence of central authorities, distributed cooperation and constrained capability. These vulnerabilities create significant challenges for routing protocols operating in the entire network. Anonymous routing is a value-added technique used in MANET for the ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Computer Standards & Interfaces

دوره 29  شماره 

صفحات  -

تاریخ انتشار 2007