Privacy-Preserving Digital Rights Management based on Attribute-based Encryption

被引:0
作者
Petrlic, Ronald [1 ]
Sorge, Christoph [1 ]
机构
[1] Univ Paderborn, D-33098 Paderborn, Germany
来源
2014 6TH INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS) | 2014年
关键词
Digital Rights Management; Privacy Protection; Attribute-based Encryption;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
We present a privacy-preserving multiparty DRM scheme that does not need a trusted third party. Users anonymously buy content from content providers and anonymously execute it at content execution centers. The executions are unlinkable to each other. The license check is performed as part of the used ciphertext-policy attribute-based encryption (CP-ABE) and, thus, access control is cryptographically enforced. The problem of authorization proof towards the key center in an ABE scheme is solved by a combination with anonymous payments.
引用
收藏
页数:5
相关论文
共 14 条
  • [1] [Anonymous], 2008, TRANSPORT LAYER SECU
  • [2] [Anonymous], 197 FIPS PUB NIST
  • [3] [Anonymous], 1999, LNCS, DOI DOI 10.1007/3-540-48405-1_34
  • [4] [Anonymous], P 10 ANN IEEE CONS C
  • [5] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [6] CHAUM D, 1990, LECT NOTES COMPUT SC, V403, P319
  • [7] Mishra D, 2012, PROCEEDINGS OF THE 2012 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI'12), P625
  • [8] Robust de-anonymization of large sparse datasets
    Narayanan, Arvind
    Shmatikov, Vitaly
    [J]. PROCEEDINGS OF THE 2008 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2008, : 111 - 125
  • [9] Petrlic R., 2012, Proceedings of the 4th International Conference on Cyberspace Safety and Security. CSS'12, P194
  • [10] A privacy-friendly architecture for future cloud computing
    Petrlic, Ronald
    Sekula, Stephan
    Sorge, Christoph
    [J]. INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2013, 4 (04) : 265 - 277