StreamTo: Streaming Content using a Tamper-Resistant Token

نویسندگان

  • Jieyin Cheng
  • Cheun Ngen Chong
  • Jeroen Doumen
  • Sandro Etalle
  • Pieter H. Hartel
  • Stefan Nikolaus
چکیده

StreamTo uses tamper resistant hardware tokens to generate the key stream needed to decrypt encrypted streaming music. The combination of a hardware token and steaming media effectively brings tried and tested PayTV technology to the Internet. We provide a security analysis and present two prototype implementations with a performance assessment, showing that the system is both effective and efficient.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

License Protection with a Tamper-Resistant Token

Content protection mechanisms are intended to enforce the usage rights on the content. These usage rights are carried by a license. Sometimes, a license even carries the key that is used to unlock the protected content. Unfortunately, license protection is difficult, yet it is important for digital rights management (DRM). Not many license protection schemes are available, and most if not all a...

متن کامل

Truly Efficient String Oblivious Transfer Using Resettable Tamper-Proof Tokens

SFE requires expensive public key operations for each input bit of the function. This cost can be avoided by using tamper-proof hardware. However, all known efficient techniques require the hardware to have long-term secure storage and to be resistant to reset or duplication attacks. This is due to the intrinsic use of counters or erasures. Known techniques that use resettable tokens rely on ex...

متن کامل

Copy Prevention Scheme Forrightstrading

This paper proposes FlexToken, a new copy prevention scheme for digital rights such as tickets or coupons, which are circulated as pieces of paper in the real world. The important feature of this scheme is that digital rights are represented using two separate types of information: the contents and the token of the rights. The token represents the \genuineness" of the contents and distinguishes...

متن کامل

Unconditional and Composable Security Using a Single Stateful Tamper-Proof Hardware Token

Cryptographic assumptions regarding tamper proof hardware tokens have gained increasing attention. Even if the tamper-proof hardware is issued by one of the parties, and hence not necessarily trusted by the other, many tasks become possible: Tamper proof hardware is sufficient for universally composable protocols, for information-theoretically secure protocols, and even allow to create software...

متن کامل

Secure Audit Logging with Tamper-Resistant Hardware

Secure perimeter schemes (e.g. DRM) and tracing traitor schemes (e.g. watermarking, audit logging) strive to mitigate the problems of content escaping the control of the rights holder. Secure audit logging records the user’s actions on content and enables detection of some forms of tampering with the logs. We implement Schneier and Kelsey’s secure audit logging protocol [1], strengthening the p...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005