One-time installation with traitors tracing for copyright programs

被引:0
|
作者
Lin, CH [1 ]
Lee, CY [1 ]
机构
[1] Tunghai Univ, Dept Comp Sci & Informat Engn, Taichung 40704, Taiwan
来源
35TH ANNUAL 2001 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS | 2001年
关键词
intellectual property; one-time install solution; software protection; traitor tracing; smart card; one-way hash function; symmetric cryptosystem;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
We propose an innovative software protection scheme by using smart cards. By the use of this scheme, a buyer can purchase software, from a merchant on the Internet, using his (or her) smart card. The bought software, after downloading from website of the merchant, will be protected in such a way that it can only be installed one time in the buyer's computer. Further, a buyer who redistributed copies of the bought software, called a traitor, can be traced from an illegal copy of software program. This scheme strengthens intellectual property protection by preventing from illegal install and use of software programs.
引用
收藏
页码:149 / 155
页数:7
相关论文
共 10 条
  • [1] A mutual one-time password for online application
    Azarnik, Ahmad
    Khosravi, Arash
    Rezaian, Shahab
    Moradi, Arash
    2022 SECOND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING AND HIGH PERFORMANCE COMPUTING (DCHPC), 2022, : 86 - 92
  • [2] Improvement of one-time password authentication scheme using smart cards
    Lee, NY
    Chen, JC
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2005, E88B (09) : 3765 - 3767
  • [3] One-time password password authentication scheme based on the negative database
    Zhao, Dongdong
    Luo, Wenjian
    ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2017, 62 : 396 - 404
  • [4] Cryptanalysis on one-time password authentication schemes using counter value
    Tsuji, T
    Shimizu, A
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2004, E87B (06) : 1756 - 1759
  • [5] A secure one-time password authentication scheme using smart cards
    Yeh, TC
    Shen, HY
    Hwang, JJ
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2002, E85B (11) : 2515 - 2518
  • [6] Comments on Yeh-Shen-Hwang's one-time password authentication scheme
    You, IS
    Cho, K
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2005, E88B (02) : 751 - 753
  • [7] Privacy-Preserving Authentication of Users with Smart Cards Using One-Time Credentials
    Park, Jun-Cheol
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2010, E93D (07) : 1997 - 2000
  • [8] One-time password authentication scheme using smart cards providing user anonymity
    Yoon, Eun-Jun
    Yoo, Kee-Young
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006, PT 5, 2006, 3984 : 303 - 311
  • [9] Improvement of a security enhanced one-time two-factor authentication and key agreement scheme
    Xie, Qi
    SCIENTIA IRANICA, 2012, 19 (06) : 1856 - 1860
  • [10] Stolen-verifier attack on an efficient smartcard-based one-time password authentication scheme
    Ku, WC
    Tsai, HC
    Tsaur, MJ
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2004, E87B (08) : 2374 - 2376