期刊文献+

改进的数字版权保护模型 被引量:1

Improved digital copyright protection model
下载PDF
导出
摘要 为有效解决目前数字版权保护模型中存在的对称性和不具备可撤销性等问题,提出了一种改进的基于叛逆者追踪方案的数字版权保护模型。该改进模型应用了不经意多项式估值(OPE)协议的特点,用户在注册阶段,商家和用户同时执行OPE协议,真正实现了两者之间的非对称性。针对买家付款后却可能收不到产品的问题,新模型还引进了既可以保护商家利益又可以保护用户利益的可信中心(TC),使其更具有实用性。改进模型还增加了软件服务撤销功能,该算法进一步完善了版权保护。通过具体实例表明了该模型的可行性和有效性。 To solve the symmetry and the non-revocation of current digital copyright protection model,an improved model based on traitor tracing scheme is proposed.This improved model applied oblivious polynomial evaluation(OPE) protocol features.In the user registration phase.Merchants and users simultaneously execute OPE,non-symmetry truly is carried out between both.Aiming at the problems of failing to receive the service after paying for the product,a trusted center(TC) which protects the merchant's and the buyers' interest is introduced to the model and makes the latest more practical.Furthermore,a software revocation procedure is also proposed in the improved model which enhanced copyright protection.Finally,a concrete example is presented to verify the feasibility and efficiency of the method.
出处 《计算机工程与设计》 CSCD 北大核心 2011年第1期24-27,共4页 Computer Engineering and Design
关键词 数字版权保护 叛逆者追踪 不经意多项式估值协议 可撤销性 非对称性 digital copyright protection traitor tracing oblivious polynomial evaluation protocol non-revocation non-symmetry
  • 相关文献

参考文献10

  • 1Lin Yu-Tzu, Wu Ja-Ling. Traceable multimedia fingerprinting based on the multilevel user grouping [C]. IEEE International Conference on Multimedia & Expo,2008.
  • 2Jin Hongxia, Jeffrey Lotspiech. Unifying broadcast encryption and traitor tracing for content protection [C]. Annual Computer Security Applications Conference,2009.
  • 3Ma Yizhou, Ding Yuewei. Reed-solomon codes as traceability codes with an efficient tracing algorithm [C]. Proceedings of ICSP,2006.
  • 4Tee V D,Safavi-Naini R,Zhang F.New traitor tracing schemes using bilinear map[C].DRM'03,2003:67-76.
  • 5Dan Boneh,Brent Waters.A fully collusion resistant broadcast trace and revoke system with public traceability [C]. ACM Conference on Computer and Communication Security, 2006.
  • 6Chor B,Fiat A,Naor M.Tracing traitors[J].Lecture Notes in Computer Science 839,Springer-Verlag, 1994:257-270.
  • 7Maki Yoshida,Toru Fujiwara.Expiration dated fingerprinting[C].International Conference on Intelligent Information Hiding and Multimedia Signal Processing,2008:147-150.
  • 8Fu Cheng You. Application of mobile agent and trusted third party on digital copyright protecting in E-commerce[C].International Symposium on Computer Science and Computational Technology, 2008:800-804.
  • 9ZHANG Xuejun.An Improved Traitor Tracing Scheme Based on Bilinear Map[J].Wuhan University Journal of Natural Sciences,2007,12(1):5-8. 被引量:2
  • 10Noar M,Pinkas B.Oblivious transfer and polynomial evaluation [C].Proc'99, Atlanta: ACM, 1999:245-254.

二级参考文献4

  • 1Kiayias A,Yung M.Breaking and Repairing Asymmetric Public-Key Traitor Tracing[].Digital Rights Management Workshop.2003
  • 2Naor M,Pinkas B.Oblivious Transfer and Polynomial Evaluation[].Proc of STOC’.1999
  • 3Mitsunari S,Sakai R,Kasahara M.A New Traitor Tracing[].IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences.2002
  • 4T? V D,Safavi-Naini R,Zhang F.New Traitor Tracing Schemes Using Bilinear Map[].Proc of the ACM Workshop on DRM.2003

共引文献1

同被引文献5

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部