[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

Fail-Stop Authentication Protocol for Digital Rights Management in Adaptive Information Retrieval System

  • Conference paper
Advances in Web-Age Information Management (WAIM 2004)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3129))

Included in the following conference series:

  • 923 Accesses

Abstract

Digital Rights Management (DRM) is one of the most important issues in digital library, however it is difficult to balance security and efficiency of DRM system in open network environment, especially when the environment is unauthentic. In this paper, a new and Secure Authentication protocol for Digital Rights Management (SADIRM) is proposed to provide perfect usage control and fair transaction in adaptive information retrieval system, in which a License Finite States Machine (LFSM) is adopted to manage the digital rights under a third part Certificate Authority (CA), thus it is secure and fair for atomic authorization and forced revocation of license dynamically. During the interaction of all transaction stages, a fail-stop digital signature is used for identity authentication, integrity verification, and undeniability. Analysis manifests the proposed protocol is feasible, secure with high integrity and it provides a new and reliable approach for DRM.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 71.50
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 89.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Bordoloi, B., Ilami, P., Mykytyn, P.P., Mykytyn, K.: Copyrighting computer software: The “look and feel” controversy and beyond. Information & Management 30(5), 211–221 (1993)

    Article  Google Scholar 

  2. Milagros, D.C.: Copyright in the digital environment. International Information and Library Review 29(2), 201–204 (1997)

    Article  Google Scholar 

  3. Su, J.K., Hartung, F., Girod, B.: Digital watermarking of text, image, and video documents. Computers & Graphics 22(6), 687–695 (1998)

    Article  Google Scholar 

  4. Lin, P.L.: Digital watermarking models for resolving rightful ownership and authenticating legitimate customer. Journal of Systems and Software 55(3), 261–271 (2001)

    Article  Google Scholar 

  5. Eskicioglu, A.M., Delp, E.J.: An overview of multimedia content protection in consumer electronics devices. Signal Processing: Image Communication 16(7), 681–699 (2001)

    Article  Google Scholar 

  6. Waller, A.O., Jones, G., Whitley, T., Edwards, J., Kaleshi, D., Munro, A., MacFarlane, B., Wood, A.: Securing the delivery of digital content over the Internet. Electronics & Communication Engineering Journal 14(5), 239–248 (2002)

    Article  Google Scholar 

  7. Lee, W.B., Chen, T.H.: A public verifiable copy protection technique for still images. Journal of Systems and Software 62(3), 195–204 (2002)

    Article  Google Scholar 

  8. Eskicioglu, A.M., Delp, E.J.: An overview of multimedia content protection in consumer electronics devices. Signal Processing: Image Communication 16(7), 681–699 (2001)

    Article  Google Scholar 

  9. Biehl, I., Meyer, B.: Cryptographic methods for collusion-secure fingerprinting of digital data. Computers and Electrical Engineering 28(1), 59–75 (2002)

    Article  MATH  Google Scholar 

  10. Oz, E.: Acceptable protection of software intellectual property: a survey of software developers and lawyers. Information & Management 34(3), 161–173 (1998)

    Article  MathSciNet  Google Scholar 

  11. Yoon, K.: The optimal level of copyright protection. Information Economics and Policy 14(3), 327–348 (2002)

    Article  Google Scholar 

  12. Schneier, B.: Applied cryptography-protocols, algorithm and source code in C, 2nd edn. John Wiley & Sons Inc., New York (1996)

    Google Scholar 

  13. van Heyst, E., Pedersen, T.P., Pfitzmann, B.: New constructions of fail-stop signatures and lower bounds. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 15–30. Springer, Heidelberg (1993)

    Google Scholar 

  14. van Heyst, E., Pedersen, T.P.: How to make efficient fail-stop signatures. In: Rueppel, R.A. (ed.) EUROCRYPT 1992. LNCS, vol. 658, pp. 366–377. Springer, Heidelberg (1993)

    Chapter  Google Scholar 

  15. Damgard, I.B., Pedersen, T.P., Pfitzmann: On the existence of statistically hiding bit commitment schemes and fail-stop signature. Journal of Cryptology 10, 163–194 (1997)

    Article  MATH  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ma, Z., Feng, B. (2004). Fail-Stop Authentication Protocol for Digital Rights Management in Adaptive Information Retrieval System. In: Li, Q., Wang, G., Feng, L. (eds) Advances in Web-Age Information Management. WAIM 2004. Lecture Notes in Computer Science, vol 3129. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-27772-9_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-27772-9_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-22418-1

  • Online ISBN: 978-3-540-27772-9

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics