Abstract
Digital Rights Management (DRM) is one of the most important issues in digital library, however it is difficult to balance security and efficiency of DRM system in open network environment, especially when the environment is unauthentic. In this paper, a new and Secure Authentication protocol for Digital Rights Management (SADIRM) is proposed to provide perfect usage control and fair transaction in adaptive information retrieval system, in which a License Finite States Machine (LFSM) is adopted to manage the digital rights under a third part Certificate Authority (CA), thus it is secure and fair for atomic authorization and forced revocation of license dynamically. During the interaction of all transaction stages, a fail-stop digital signature is used for identity authentication, integrity verification, and undeniability. Analysis manifests the proposed protocol is feasible, secure with high integrity and it provides a new and reliable approach for DRM.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Bordoloi, B., Ilami, P., Mykytyn, P.P., Mykytyn, K.: Copyrighting computer software: The “look and feel” controversy and beyond. Information & Management 30(5), 211–221 (1993)
Milagros, D.C.: Copyright in the digital environment. International Information and Library Review 29(2), 201–204 (1997)
Su, J.K., Hartung, F., Girod, B.: Digital watermarking of text, image, and video documents. Computers & Graphics 22(6), 687–695 (1998)
Lin, P.L.: Digital watermarking models for resolving rightful ownership and authenticating legitimate customer. Journal of Systems and Software 55(3), 261–271 (2001)
Eskicioglu, A.M., Delp, E.J.: An overview of multimedia content protection in consumer electronics devices. Signal Processing: Image Communication 16(7), 681–699 (2001)
Waller, A.O., Jones, G., Whitley, T., Edwards, J., Kaleshi, D., Munro, A., MacFarlane, B., Wood, A.: Securing the delivery of digital content over the Internet. Electronics & Communication Engineering Journal 14(5), 239–248 (2002)
Lee, W.B., Chen, T.H.: A public verifiable copy protection technique for still images. Journal of Systems and Software 62(3), 195–204 (2002)
Eskicioglu, A.M., Delp, E.J.: An overview of multimedia content protection in consumer electronics devices. Signal Processing: Image Communication 16(7), 681–699 (2001)
Biehl, I., Meyer, B.: Cryptographic methods for collusion-secure fingerprinting of digital data. Computers and Electrical Engineering 28(1), 59–75 (2002)
Oz, E.: Acceptable protection of software intellectual property: a survey of software developers and lawyers. Information & Management 34(3), 161–173 (1998)
Yoon, K.: The optimal level of copyright protection. Information Economics and Policy 14(3), 327–348 (2002)
Schneier, B.: Applied cryptography-protocols, algorithm and source code in C, 2nd edn. John Wiley & Sons Inc., New York (1996)
van Heyst, E., Pedersen, T.P., Pfitzmann, B.: New constructions of fail-stop signatures and lower bounds. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 15–30. Springer, Heidelberg (1993)
van Heyst, E., Pedersen, T.P.: How to make efficient fail-stop signatures. In: Rueppel, R.A. (ed.) EUROCRYPT 1992. LNCS, vol. 658, pp. 366–377. Springer, Heidelberg (1993)
Damgard, I.B., Pedersen, T.P., Pfitzmann: On the existence of statistically hiding bit commitment schemes and fail-stop signature. Journal of Cryptology 10, 163–194 (1997)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ma, Z., Feng, B. (2004). Fail-Stop Authentication Protocol for Digital Rights Management in Adaptive Information Retrieval System. In: Li, Q., Wang, G., Feng, L. (eds) Advances in Web-Age Information Management. WAIM 2004. Lecture Notes in Computer Science, vol 3129. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-27772-9_9
Download citation
DOI: https://doi.org/10.1007/978-3-540-27772-9_9
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-22418-1
Online ISBN: 978-3-540-27772-9
eBook Packages: Springer Book Archive