期刊文献+

基于代理签名机制的DRM系统许可授权协议

Access Granting Protocol of DRM System Based on Proxy Signature Scheme
下载PDF
导出
摘要 为解决越来越多的用户使用数字版权管理(DRM)系统购买电子产品而导致的系统中证书服务器在颁发证书时出现的系统瓶颈问题,基于代理签名技术的原理,设计了一个由多个签名服务器组成的DRM系统,并在此系统上设计了一个许可授权协议.由于多个签名服务器参与负载分担,保证了服务器负担的降低以及系统运行的稳定.文中还通过数学的方法证明了在增加代理签名服务器的前提下,系统整体安全性不低于单签名服务器系统的安全性. In order to solve the bottleneck problem of the signing server due to the purchase of electronic products via DRM systems used by more and more users, a DRM system consisting of multiple signing servers is designed based on the principle of proxy signature, and an access granting protocol based on the system is presented. As there are multiple signing servers to share the burden, the burden on each server is lightened and the stability of the system can be guaranteed. Moreover, it is mathematically proved that the integrated security of the multi-signing server system is not less than that of the single-singing server one.
出处 《华南理工大学学报(自然科学版)》 EI CAS CSCD 北大核心 2008年第9期55-58,共4页 Journal of South China University of Technology(Natural Science Edition)
基金 广东省自然科学基金资助项目(05006593)
关键词 数字版权管理系统 信息安全 离散对数 代理签名 许可授权协议 DRM system information security discrete logarithm proxy signature access granting protocol
  • 相关文献

参考文献11

  • 1Smith M. Digital rights management & protecting the digital media value chain [ C]//Proc of the 3rd International Conference on Mobile and Ubiquitous Multimedia. Maryland : ACM ,20(M : 187-191.
  • 2Mori R, Kawaharam M. Super distribution : the concept and the architecture [ J]. Transactions of the IEICE, 1990, E73(7) :1 133-1 146.
  • 3Mambo M, Usuda K, Okamoto E. Proxy signatures for delegating signing operation [ C ] //Proc of the 3rd ACM Conference on Computer and Communications Security. New Delhi : ACM, 1996:48-57.
  • 4Mambo M, Usuda K, Okamoto E. Proxy signatures:delegation of the power to sign messages [ J ]. IEICE Trans Fundam, 1996, E79-A (9) : 1338-1354.
  • 5Hsu C L, Wu T S, Wu T C. New nonrefundable threshold proxy signature scheme with known signers [ J ]. Journal of System and Software, 2001,58 ( 2 ) : 119-124.
  • 6Hwang M S, Lin L C, Lu J L E. A secure nonrefundable threshold proxy signature scheme with known signers [ J ]. Information ,2000,11 ( 2 ) : 137-144.
  • 7Sun H M. An efficient nonrepudiable threshold proxy signature scheme with known signers [ J ]. Computer Communications, 1999,22(8) :717-722.
  • 8Sun H M, Lee N Y, Hwang T. Threshold proxy signatures [ J ]. IEE Proceedings of Computers and Digital Techniques, 1999,146 ( 5 ) : 259- 263.
  • 9Hwang S J, Shi C H. A simple multi-proxy signature scheme [C ] //Proc of the 10th National Conference on Information Security. Hualien : ROC ,2000 : 134-138.
  • 10卢明欣,傅晓彤,张宁,肖国镇.无可信中心的秘密共享-多重签名方案[J].华南理工大学学报(自然科学版),2007,35(1):99-101. 被引量:4

二级参考文献10

  • 1许春香,肖国镇.门限多重秘密共享方案[J].电子学报,2004,32(10):1688-1689. 被引量:41
  • 2柳毅,许文丽,王育民.基于可验证秘密分享的移动代理安全支付协议[J].华南理工大学学报(自然科学版),2005,33(6):14-17. 被引量:5
  • 3Shamir A.How to share a secret[J].Communications of the ACM,1979,22(11):612-613.
  • 4Desmedt Y,Frankel Y.Shared generation of authenticators and signature[C]∥Feigenbaum J.Proc of Advances in Cryptology-Crypto'91.Berlin-Heidelberg:Springer-Verlag,1998:457-469.
  • 5Wang C T,Lin C H,Chang C C.Threshold signature schemes with traceable signers in group communications[J].Computer Communications,1998,21(8):771-776.
  • 6Harn L.Group-oriented (t,n) threshold digital signature scheme and digital multisignature[J].IEE Proceedings of Computers and Digital and Technique,1994,141(5):307-313.
  • 7Li Chuan-ming,Hwang T,Lee N Y,et al.(t,n) threshold-multisignature scheme and generalized multisignature scheme where suspected forgery implies traceability of adversarial shareholders[J].Cryptologia,2000,24(3):250-268.
  • 8Elgamal T.A public-key cryptosystem and a signature scheme based on discrete logarithms[J].IEEE Trans on Information Theory,1985,31(4):469-472.
  • 9Schnorr C P.Efficient signature generation for smart cards[J].Journal of Cryptology,1991,4(3):161-174.
  • 10Rosario G,Stanislaw J,Hugo K.Robust threshold DSS signatures[J].Information and Computation,2001,164(1):54-84.

共引文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部