上海交通大学学报(英文版) ›› 2014, Vol. 19 ›› Issue (4): 443-447.doi: 10.1007/s12204-014-1523-5

• • 上一篇    下一篇

Secure and Efficient Digital Rights Management Mechanisms with Privacy Protection

HUANG Jheng-jia1 (黄政嘉), LU Pei-chun2 (卢佩君), JUANG Wen-shenq2* (庄文胜), FAN Chun-i1 (范俊逸), LIN Zheng-yang2 (林政扬), LIN Chun-hung2 (林俊宏)   

  1. (1. Department of Computer Science and Engineering, National Sun Yat-sen University, Kaohsiung 804, Taiwan, China; 2. Department of Information Management, National Kaohsiung First University of Science and Technology, Kaohsiung 811, Taiwan, China)
  • 发布日期:2014-10-13
  • 通讯作者: JUANG Wen-shenq (庄文胜) E-mail:wsjuang@nkfust.edu.tw

Secure and Efficient Digital Rights Management Mechanisms with Privacy Protection

HUANG Jheng-jia1 (黄政嘉), LU Pei-chun2 (卢佩君), JUANG Wen-shenq2* (庄文胜), FAN Chun-i1 (范俊逸), LIN Zheng-yang2 (林政扬), LIN Chun-hung2 (林俊宏)   

  1. (1. Department of Computer Science and Engineering, National Sun Yat-sen University, Kaohsiung 804, Taiwan, China; 2. Department of Information Management, National Kaohsiung First University of Science and Technology, Kaohsiung 811, Taiwan, China)
  • Published:2014-10-13
  • Contact: JUANG Wen-shenq (庄文胜) E-mail:wsjuang@nkfust.edu.tw

摘要: In the Internet or cloud computing environments, service providers provide more and more content services. Users can use these convenient content services in daily life. The major data of the user are maintained by the service providers except that some personal privacy data are stored at the client device. An attacker may try to invade the systems, and it will cause the damage of users and service providers. Also, users may lose their mobile devices and then it may cause the data disclosure problem. As a result, the data and privacy protection of users become an important issue in these environments. Besides, since many mobile devices are used in these environments, secure authentication and data protection methods must be efficient in these low resource environments. In this paper, we propose an efficient and privacy protection digital rights management (DRM) scheme that users can verify the valid service servers and the service servers can ensure the legal users. Since the key delegation center of the third party has the robust security protection, our proposed scheme stores the encrypted secret keys in the key delegation center. This approach not only can reduce the storage space of the user devices, but also can recover the encrypted secret keys in the key delegation center when a user loses her/his devices for solving the device losing problem.

关键词: identity authentication, elliptic curve cryptosystem, privacy protection, digital rights management(DRM)

Abstract: In the Internet or cloud computing environments, service providers provide more and more content services. Users can use these convenient content services in daily life. The major data of the user are maintained by the service providers except that some personal privacy data are stored at the client device. An attacker may try to invade the systems, and it will cause the damage of users and service providers. Also, users may lose their mobile devices and then it may cause the data disclosure problem. As a result, the data and privacy protection of users become an important issue in these environments. Besides, since many mobile devices are used in these environments, secure authentication and data protection methods must be efficient in these low resource environments. In this paper, we propose an efficient and privacy protection digital rights management (DRM) scheme that users can verify the valid service servers and the service servers can ensure the legal users. Since the key delegation center of the third party has the robust security protection, our proposed scheme stores the encrypted secret keys in the key delegation center. This approach not only can reduce the storage space of the user devices, but also can recover the encrypted secret keys in the key delegation center when a user loses her/his devices for solving the device losing problem.

Key words: identity authentication, elliptic curve cryptosystem, privacy protection, digital rights management(DRM)

中图分类号: