期刊文献+

基于代理重加密的多媒体数字版权授权协议 被引量:2

Authorization Protocol of Multimedia Digital Rights Management Based on Proxy Re-Encryption
原文传递
导出
摘要 针对数字内容使用和共享中版权保护的问题,提出一种基于代理重加密的多媒体数字版权授权协议.该协议允许内容提供商在客户端加密多媒体内容,内容使用者获取加密的多媒体内容后向许可证服务器申请许可证,内容使用者下载许可证后向密钥代理服务器提交内容加密密钥重加密申请,密钥代理服务器重加密内容加密密钥后返回给内容使用者,而许可证服务器无法获取内容加密密钥明文.在该协议的基础上,实现了云计算环境下的数字电视节目内容共享平台.对比结果和实际运行情况表明,该协议在内容使用和共享过程中不需要重新加密内容,能有效抵抗合谋攻击,效率及安全性较高. In order to protect the copyright of digital content, an authorization protocol of multimedia dig- ital rights management based on proxy re-encryption is proposed. The proposed protocol allows content providers to encrypt multimedia content on their clients, and allows the users to share the encrypted mul- timedia content and apply license from license server. After obtaining the license, the users can apply the content encryption key from key proxy server. The key proxy server re-encrypts the content encryption key and sends the encrypted content encryption key to the users, while license server cannot get the content encryption key. Based on the proposed protocol, a content sharing platform for digital TV programs in cloud computing is developed. The comparison results and practical application show that the proposed protocol does not need to re-enerypt content when sharing, and can effectively resist the collision attacks, which is efficient and secure.
出处 《北京邮电大学学报》 EI CAS CSCD 北大核心 2013年第6期7-12,共6页 Journal of Beijing University of Posts and Telecommunications
基金 国家自然科学基金项目(60803157 90812001 61272519)
关键词 数字版权管理 代理重加密 内容共享 许可授权 digital rights management proxy re-encryption content sharing authorization
  • 相关文献

参考文献8

  • 1马兆丰,范科峰,陈铭,杨义先,钮心忻.支持时空约束的可信数字版权管理安全许可协议[J].通信学报,2008,29(10):153-164. 被引量:20
  • 2Wang Chaokun, Zou Peng, Liu Zhang, et al. CS-DRM :a cloud-based SIM DRM scheme for mobile internet [ J].Eurasip Journal on Wireless Communications and Networ-king, 2011(1) : 1-30. 被引量:1
  • 3Blaze M , Bleumer G, Strauss M. Divertible protocols andatomic proxy cryptography [ C] // Advances in Cryptology-EUROCRYPT1998 , International Conference on the The-ory and Application of Cryptographic Techniques. Espoo :LNCS 1403, 1998: 127-144. 被引量:1
  • 4Ateniese G,Fu K, Green M, et al. Improved proxy re-encryption schemes with applications to secure distributedstorage [J]. ACM Transactions on Information and SystemSecurity, 2006, 9(1) : 1-30. 被引量:1
  • 5Taban G, Cardenas A A , Gligor V D. Towards a secureand interoperable DRM architecture [ C] // Proceedings ofthe 6th ACM Workshop on Digital Rights Management.New York: ACM Press, 2006; 69-78. 被引量:1
  • 6Lee S,Park H, Kim J. A secure and mutual-profitableDRM interoperability scheme [ C] // ISCC 2010. NewYork; IEEE Inc, 2010; 75-80. 被引量:1
  • 7Ma Guojun, Pei Qingqi, Wang Yuchen. A general sha-ring model based on proxy re-encryption [ C] // IIHMSP2011. Piscataway: IEEE Computer Society, 2011: 248-251. 被引量:1
  • 8Petrlic R, Sorge C. Privacy-preserving DRM for cloudcomputing[ C] // WAINA 2012. Piscataway: IEEE Com-puter Society, 2012 : 1286-1291. 被引量:1

二级参考文献25

共引文献19

同被引文献24

引证文献2

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部