Unlinkable Content Playbacks in a Multiparty DRM System
نویسندگان
چکیده
We present a solution to the problem of privacy invasion in a multiparty digital rights management scheme. (Roaming) users buy content licenses from a content provider and execute it at any nearby content distributor. Our approach, which does not need any trusted third party—in contrast to most related work on privacy-preserving DRM—is based on a re-encryption scheme that runs on any mobile Android device. Only a minor security-critical part needs to be performed on the device’s smartcard which could, for instance, be a SIM card.
منابع مشابه
Comprehensive Disaster Risk Management Standards for Hospitals
Background and Objective: Hospitals play an important role in protecting the health and survival of people during disasters. Despite the development of risk management programs worldwide in recent years, hospital preparedness in disasters is low and one reason for that is the lack of hospital standards for disaster preparedness. This study aims to develop hospital accreditation standards for ho...
متن کاملA personal mobile DRM manager for smartphones
In this paper we report on our experience in building the experimental Personal Digital Rights Manager for Motorola smart phones, an industry first. Digital Rights Management allows producers or owners of digital content to control the manner in which the content is consumed. This may range from simply preventing duplication to finer access policies such as restricting who can use the content, ...
متن کاملA Group Key Distribution System Based on the Generalized Aryabhata Remainder Theorem for Enterprise Digital Rights Management
Digital Rights Management (DRM) is a type of access-control technology that is used by diverse content providers to restrict the use of digital content. Enterprise Digital Rights Management (E-DRM) is an application of DRM techniques for managing the control of access to sensitive documents in an enterprise. In this paper, we propose a group key distribution system for E-DRM based on the concep...
متن کاملCombining DRM with Trusted Computing for Effective Information Access Management
In this paper we used Digital Rights Management (DRM) associated with Trusted Computing to enforce a contentspecific fine-grained access control policy defined by content owner. This policy is associated with content, and when content is copied its access control policy is copied and bound to the target copy. This paper presents a generic approach for content protection utilising both DRM and T...
متن کاملA Novel DRM Security Scheme and its Prototype System Implementation
Abstract A DRM system scheme based on PKI is proposed and designed in this paper, which can achieve effective user authentication, secure distribution of digital content and usage rights control. The architecture of system,secure mechanism, playback control mechanism are described in detail. Finally, against the offline usage control of the audio and video content in user terminal, we design a ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013