File Download
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1109/ICCT.2011.6157967
- Scopus: eid_2-s2.0-84863244539
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Conference Paper: Avoid illegal encrypted DRM content sharing with non-transferable re-encryption
Title | Avoid illegal encrypted DRM content sharing with non-transferable re-encryption |
---|---|
Authors | |
Keywords | Access rights Content providers Content sharing Digital contents Digital rights management technology |
Issue Date | 2011 |
Publisher | IEEE. The Journal's web site is located at http://ieeexplore.ieee.org/xpl/conhome.jsp?punumber=1000099 |
Citation | The IEEE 13th International Conference on Communication Technology (ICCT 2011), Jinan, China, 25-28 September 2011. In Proceedings of the 13th ICCT, 2011, p. 703-708 How to Cite? |
Abstract | Digital rights management (DRM) technology enables valuable electronic media content distribution while preserving content providers' rights and revenues. Traditional DRM system utilizes security techniques to restrict copying of media content or allow only a single copy to be made. However consumers are demanding for the right to make copies for personal use or the right to use content on any device. Several DRM infrastructures have been proposed for secure content sharing. These infrastructures usually require cooperation and participation of both DRM technology providers and content providers; however there is a popular flaw in these schemes: the malicious employees of DRM technology providers can distribute DRM enabled contents to any consumers or make copies of a purchased content accessible to any devices without letting content provider know, thus reducing content providers' benefit. In this paper, we propose a novel DRM infrastructure which is based on a non-transferable re-encryption scheme to solve the above problem inherent in existing DRM infrastructures. In the proposed infrastructure, DRM technology providers and content providers are required to cooperate to make a purchased digital content for a specific device accessible by other different devices, and get extra profit from providing such services. The system preserves DRM technology providers and content providers' security properties while achieving secure and mutual profitable DRM content sharing. Furthermore, we allow content providers to trace the content, and control the content sharing rights. Even when malicious employees in DRM technology providers and DRM agent collude, they cannot re-delegate access rights to any device without permission from content provider, thus preserving content provider's benefit. © 2011 IEEE. |
Persistent Identifier | http://hdl.handle.net/10722/152036 |
ISBN | |
References |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | He, Y | en_US |
dc.contributor.author | Hui, LCK | en_US |
dc.contributor.author | Yiu, SM | en_US |
dc.date.accessioned | 2012-06-26T06:32:43Z | - |
dc.date.available | 2012-06-26T06:32:43Z | - |
dc.date.issued | 2011 | en_US |
dc.identifier.citation | The IEEE 13th International Conference on Communication Technology (ICCT 2011), Jinan, China, 25-28 September 2011. In Proceedings of the 13th ICCT, 2011, p. 703-708 | en_US |
dc.identifier.isbn | 978-1-61284-307-0 | - |
dc.identifier.uri | http://hdl.handle.net/10722/152036 | - |
dc.description.abstract | Digital rights management (DRM) technology enables valuable electronic media content distribution while preserving content providers' rights and revenues. Traditional DRM system utilizes security techniques to restrict copying of media content or allow only a single copy to be made. However consumers are demanding for the right to make copies for personal use or the right to use content on any device. Several DRM infrastructures have been proposed for secure content sharing. These infrastructures usually require cooperation and participation of both DRM technology providers and content providers; however there is a popular flaw in these schemes: the malicious employees of DRM technology providers can distribute DRM enabled contents to any consumers or make copies of a purchased content accessible to any devices without letting content provider know, thus reducing content providers' benefit. In this paper, we propose a novel DRM infrastructure which is based on a non-transferable re-encryption scheme to solve the above problem inherent in existing DRM infrastructures. In the proposed infrastructure, DRM technology providers and content providers are required to cooperate to make a purchased digital content for a specific device accessible by other different devices, and get extra profit from providing such services. The system preserves DRM technology providers and content providers' security properties while achieving secure and mutual profitable DRM content sharing. Furthermore, we allow content providers to trace the content, and control the content sharing rights. Even when malicious employees in DRM technology providers and DRM agent collude, they cannot re-delegate access rights to any device without permission from content provider, thus preserving content provider's benefit. © 2011 IEEE. | en_US |
dc.language | eng | en_US |
dc.publisher | IEEE. The Journal's web site is located at http://ieeexplore.ieee.org/xpl/conhome.jsp?punumber=1000099 | - |
dc.relation.ispartof | International Conference on Communication Technology Proceedings | en_US |
dc.subject | Access rights | - |
dc.subject | Content providers | - |
dc.subject | Content sharing | - |
dc.subject | Digital contents | - |
dc.subject | Digital rights management technology | - |
dc.title | Avoid illegal encrypted DRM content sharing with non-transferable re-encryption | en_US |
dc.type | Conference_Paper | en_US |
dc.identifier.email | He, Y: yjhe@cs.hku.hk | en_US |
dc.identifier.email | Hui, LCK: hui@cs.hku.hk | en_US |
dc.identifier.email | Yiu, SM: smyiu@cs.hku.hk | - |
dc.identifier.authority | Hui, LCK=rp00120 | en_US |
dc.identifier.authority | Yiu, SM=rp00207 | en_US |
dc.description.nature | link_to_subscribed_fulltext | en_US |
dc.identifier.doi | 10.1109/ICCT.2011.6157967 | en_US |
dc.identifier.scopus | eid_2-s2.0-84863244539 | - |
dc.identifier.hkuros | 211616 | - |
dc.relation.references | http://www.scopus.com/mlt/select.url?eid=2-s2.0-84858167366&selection=ref&src=s&origin=recordpage | en_US |
dc.identifier.spage | 703 | en_US |
dc.identifier.epage | 708 | en_US |
dc.publisher.place | United States | - |
dc.description.other | The IEEE 13th International Conference on Communication Technology (ICCT 2011), Jinan, China, 25-28 September 2011. In Proceedings of the 13th ICCT, 2011, p. 703-708 | - |
dc.identifier.scopusauthorid | Yiu, SM=7003282240 | en_US |
dc.identifier.scopusauthorid | Hui, LCK=8905728300 | en_US |
dc.identifier.scopusauthorid | He, YJ=55085499400 | en_US |