File Download
  Links for fulltext
     (May Require Subscription)
Supplementary

Conference Paper: Avoid illegal encrypted DRM content sharing with non-transferable re-encryption

TitleAvoid illegal encrypted DRM content sharing with non-transferable re-encryption
Authors
KeywordsAccess rights
Content providers
Content sharing
Digital contents
Digital rights management technology
Issue Date2011
PublisherIEEE. The Journal's web site is located at http://ieeexplore.ieee.org/xpl/conhome.jsp?punumber=1000099
Citation
The IEEE 13th International Conference on Communication Technology (ICCT 2011), Jinan, China, 25-28 September 2011. In Proceedings of the 13th ICCT, 2011, p. 703-708 How to Cite?
AbstractDigital rights management (DRM) technology enables valuable electronic media content distribution while preserving content providers' rights and revenues. Traditional DRM system utilizes security techniques to restrict copying of media content or allow only a single copy to be made. However consumers are demanding for the right to make copies for personal use or the right to use content on any device. Several DRM infrastructures have been proposed for secure content sharing. These infrastructures usually require cooperation and participation of both DRM technology providers and content providers; however there is a popular flaw in these schemes: the malicious employees of DRM technology providers can distribute DRM enabled contents to any consumers or make copies of a purchased content accessible to any devices without letting content provider know, thus reducing content providers' benefit. In this paper, we propose a novel DRM infrastructure which is based on a non-transferable re-encryption scheme to solve the above problem inherent in existing DRM infrastructures. In the proposed infrastructure, DRM technology providers and content providers are required to cooperate to make a purchased digital content for a specific device accessible by other different devices, and get extra profit from providing such services. The system preserves DRM technology providers and content providers' security properties while achieving secure and mutual profitable DRM content sharing. Furthermore, we allow content providers to trace the content, and control the content sharing rights. Even when malicious employees in DRM technology providers and DRM agent collude, they cannot re-delegate access rights to any device without permission from content provider, thus preserving content provider's benefit. © 2011 IEEE.
Persistent Identifierhttp://hdl.handle.net/10722/152036
ISBN
References

 

DC FieldValueLanguage
dc.contributor.authorHe, Yen_US
dc.contributor.authorHui, LCKen_US
dc.contributor.authorYiu, SMen_US
dc.date.accessioned2012-06-26T06:32:43Z-
dc.date.available2012-06-26T06:32:43Z-
dc.date.issued2011en_US
dc.identifier.citationThe IEEE 13th International Conference on Communication Technology (ICCT 2011), Jinan, China, 25-28 September 2011. In Proceedings of the 13th ICCT, 2011, p. 703-708en_US
dc.identifier.isbn978-1-61284-307-0-
dc.identifier.urihttp://hdl.handle.net/10722/152036-
dc.description.abstractDigital rights management (DRM) technology enables valuable electronic media content distribution while preserving content providers' rights and revenues. Traditional DRM system utilizes security techniques to restrict copying of media content or allow only a single copy to be made. However consumers are demanding for the right to make copies for personal use or the right to use content on any device. Several DRM infrastructures have been proposed for secure content sharing. These infrastructures usually require cooperation and participation of both DRM technology providers and content providers; however there is a popular flaw in these schemes: the malicious employees of DRM technology providers can distribute DRM enabled contents to any consumers or make copies of a purchased content accessible to any devices without letting content provider know, thus reducing content providers' benefit. In this paper, we propose a novel DRM infrastructure which is based on a non-transferable re-encryption scheme to solve the above problem inherent in existing DRM infrastructures. In the proposed infrastructure, DRM technology providers and content providers are required to cooperate to make a purchased digital content for a specific device accessible by other different devices, and get extra profit from providing such services. The system preserves DRM technology providers and content providers' security properties while achieving secure and mutual profitable DRM content sharing. Furthermore, we allow content providers to trace the content, and control the content sharing rights. Even when malicious employees in DRM technology providers and DRM agent collude, they cannot re-delegate access rights to any device without permission from content provider, thus preserving content provider's benefit. © 2011 IEEE.en_US
dc.languageengen_US
dc.publisherIEEE. The Journal's web site is located at http://ieeexplore.ieee.org/xpl/conhome.jsp?punumber=1000099-
dc.relation.ispartofInternational Conference on Communication Technology Proceedingsen_US
dc.rightsInternational Conference on Communication Technology Proceedings. Copyright © IEEE.-
dc.rights©2011 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.-
dc.rightsCreative Commons: Attribution 3.0 Hong Kong License-
dc.subjectAccess rights-
dc.subjectContent providers-
dc.subjectContent sharing-
dc.subjectDigital contents-
dc.subjectDigital rights management technology-
dc.titleAvoid illegal encrypted DRM content sharing with non-transferable re-encryptionen_US
dc.typeConference_Paperen_US
dc.identifier.emailHe, Y: yjhe@cs.hku.hken_US
dc.identifier.emailHui, LCK: hui@cs.hku.hken_US
dc.identifier.emailYiu, SM: smyiu@cs.hku.hk-
dc.identifier.authorityHui, LCK=rp00120en_US
dc.identifier.authorityYiu, SM=rp00207en_US
dc.description.naturepublished_or_final_versionen_US
dc.identifier.doi10.1109/ICCT.2011.6157967en_US
dc.identifier.scopuseid_2-s2.0-84863244539-
dc.identifier.hkuros211616-
dc.relation.referenceshttp://www.scopus.com/mlt/select.url?eid=2-s2.0-84858167366&selection=ref&src=s&origin=recordpageen_US
dc.identifier.spage703en_US
dc.identifier.epage708en_US
dc.publisher.placeUnited States-
dc.description.otherThe IEEE 13th International Conference on Communication Technology (ICCT 2011), Jinan, China, 25-28 September 2011. In Proceedings of the 13th ICCT, 2011, p. 703-708-
dc.identifier.scopusauthoridYiu, SM=7003282240en_US
dc.identifier.scopusauthoridHui, LCK=8905728300en_US
dc.identifier.scopusauthoridHe, YJ=55085499400en_US

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats