[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1750389.1750399acmotherconferencesArticle/Chapter ViewAbstractPublication PagesidtrustConference Proceedingsconference-collections
research-article

Privacy-preserving DRM

Published: 13 April 2010 Publication History

Abstract

This paper describes and contrasts two families of schemes that enable a user to purchase digital content without revealing to anyone what item he has purchased. One of the basic schemes is based on anonymous cash, and the other on blind decryption. In addition to the basic schemes, we present and compare enhancements to the schemes for supporting additional features such as variable costs, enforcement of access restrictions (such as "over age 21"), and the ability of a user to monitor and prevent covert privacy-leaking between a content-provider-provided box and the content provider. As we will show, the different variants have different properties in terms of amount of privacy leaking, efficiency, and ability for the content provider to prevent sharing of encryption keys or authorization credentials.

References

[1]
Bender, W., Gruhl, D., Norimoto, N., "Techniques for data hiding", Proc. of SPIE, 1995.
[2]
Boneh, D., Franklin, M., "Identity-Based Encryption from the Weil Pairing" Advances in Cryptology - Proceedings of CRYPTO 2001.
[3]
Boneh, D., "Twenty years of attacks on the RSA cryptosystem", Notices of the AMS, 1999.
[4]
Boneh, D., Shaw, J., "Collusion-secure fingerprinting for digital data", CRYPTO 1995.
[5]
Chaum, D., "Blind signatures for Untraceable payments", Advances in Cryptology - proceedings of Crypto 82, 1983.
[6]
Chaum, D., Fiat, A., and Naor, M. "Untraceable electronic cash". Proceedings on Advances in Cryptology (Santa Barbara, California, United States). 1990.
[7]
Cox., I., Miller, M., Bloom, J., "Digital Watermarking", Morgan Kaufmann Publishers Inc., 2001.
[8]
Cox, I., Kilian, J., Leighton, T., Shamoon, T., "Secure Spread Spectrum Watermarking for Multimedia", IEEE Transactions on Image Processing, 1997.
[9]
Craver, S., Memon, N., Yeo, B. L., and Yeung, M. M. "Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks and implications". IEEE Journal. Selec. Areas Comm. 1998.
[10]
Dingledine, R., Mathewson, N., Syverson, P. "Tor: The Second-Generation Onion Router". Usenix Security Symposium, 2004.
[11]
M. J. Freedman and R. Morris. Tarzan: A peer-to-peer anonymizing network layer. In 9th ACM Conference on Computer and communication Security, 2002.
[12]
Iannella, R., "Digital Rights Management (DRM) Architectures, D-Lib Magazine, June 2001.
[13]
Jonsson, J., Kaliski, B., "Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1", RFC 3447, February 2003.
[14]
Nair, S., Tanenbaum, A., Gheorghe, G., Crispo, B., "Enforcing DRM policies across applications", Proceedings of the 8th ACM workshop on Digital rights management, 2008.
[15]
Perlman, R., "The Ephemerizer: Making Data Disappear", Journal of Information System Security, 2005.
[16]
Saint-Jean, F., Johnson, A., Boneh, D., Feigenbaum, J., "Private Web Search", Proceedings of the 2007 ACM workshop on Privacy in electronic society", 2007.
[17]
Shamir, A., "Identity-Based Cryptosystems and Signature Schemes", Advances in Cryptology: Proceedings of CRYPTO 84.
[18]
Shamir, A., "How to Share a Secret", Communications of the ACM, v 22 n 11, p 612--613, Nov 1979.

Cited By

View all
  • (2021)Blind Decryption for Preserving Privacy in the DRM System2021 International Conference on Computer Science, Information Technology, and Electrical Engineering (ICOMITEE)10.1109/ICOMITEE53461.2021.9650123(213-217)Online publication date: 27-Oct-2021
  • (2018)A security scheme of digital rights management based on agent encryption and key distribution in cloud computingInternational Journal of Security and Networks10.5555/3292934.329293613:4(228-235)Online publication date: 1-Jan-2018
  • (2017)Symmetric Blind Decryption with Perfect SecrecyJournal of Computer Networks and Communications10.1155/2017/65759072017Online publication date: 1-Jan-2017
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
IDTRUST '10: Proceedings of the 9th Symposium on Identity and Trust on the Internet
April 2010
127 pages
ISBN:9781605588957
DOI:10.1145/1750389
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

  • Internet2
  • The National Institute of Standards and Technology
  • OASIS IDtrust Member Section
  • FPKIPA: Federal Public Key Infrastructure Policy Authority

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 13 April 2010

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. DRM
  2. algorithms
  3. blindable parameterizable public key
  4. privacy
  5. protocols

Qualifiers

  • Research-article

Conference

IDtrust '10
Sponsor:
  • FPKIPA
IDtrust '10: 9th Symposium on Identity and Trust on the Internet
April 13 - 15, 2010
Maryland, Gaithersburg, USA

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)2
Reflects downloads up to 12 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2021)Blind Decryption for Preserving Privacy in the DRM System2021 International Conference on Computer Science, Information Technology, and Electrical Engineering (ICOMITEE)10.1109/ICOMITEE53461.2021.9650123(213-217)Online publication date: 27-Oct-2021
  • (2018)A security scheme of digital rights management based on agent encryption and key distribution in cloud computingInternational Journal of Security and Networks10.5555/3292934.329293613:4(228-235)Online publication date: 1-Jan-2018
  • (2017)Symmetric Blind Decryption with Perfect SecrecyJournal of Computer Networks and Communications10.1155/2017/65759072017Online publication date: 1-Jan-2017
  • (2016)Content sharing schemes in DRM systems with enhanced performance and privacy preservationJournal of Computer Security10.3233/JCS-1574624:6(667-688)Online publication date: 1-Jan-2016
  • (2016)Digital Rights Management - Current Status and Future Trends2016 3rd International Conference on Information Science and Control Engineering (ICISCE)10.1109/ICISCE.2016.82(338-342)Online publication date: Jul-2016
  • (2015)An Accountable Privacy Architecture for Digital Rights Management SystemProceedings of the Sixth International Conference on Computer and Communication Technology 201510.1145/2818567.2818668(328-332)Online publication date: 25-Sep-2015
  • (2014)Digital Rights ManagementDigital Arts and Entertainment10.4018/978-1-4666-6114-1.ch009(229-247)Online publication date: 2014
  • (2014)Analysing Security and Privacy Management for Cloud Computing EnvironmentProceedings of the 2014 Fourth International Conference on Communication Systems and Network Technologies10.1109/CSNT.2014.142(677-680)Online publication date: 7-Apr-2014
  • (2013)Unlinkable Content Playbacks in a Multiparty DRM SystemProceedings of the 27th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy XXVII - Volume 796410.5555/2940086.2940114(289-296)Online publication date: 15-Jul-2013
  • (2013)A privacy-friendly architecture for future cloud computingInternational Journal of Grid and Utility Computing10.1504/IJGUC.2013.0571204:4(265-277)Online publication date: 1-Oct-2013
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media