TY - GEN
T1 - An efficient and secure rights sharing method for DRM system against replay attack
AU - Choi, Donghyun
AU - Lee, Yunho
AU - Kang, Hogab
AU - Kim, Seungjoo
AU - Won, Dongho
PY - 2007
Y1 - 2007
N2 - In the past years there has been an increasing interest in developing DRM (Digital Rights Management) systems. The purpose of DRM is to protect the copyrights of content providers and to enable only designated users to access digital contents. From the consumers' point of view, they have a tendency to go against complex and confusing limitations. Consumers want to enjoy contents without hassle and with as few limitations as possible. The concept of Authorized Domain (AD) was presented to remove such problems. However, the previous work on authorized domain has two problems. The first is that it requires a rather expensive revocation mechanism. The second is that the devices still can play contents which are previously obtained even though they are currently out of the authorized domain. On the contrary, our scheme prevents the content from being played by devices which are out of the domain for better security. Furthermore our scheme does not need to maintain a revocation list and can prevent replay attack.
AB - In the past years there has been an increasing interest in developing DRM (Digital Rights Management) systems. The purpose of DRM is to protect the copyrights of content providers and to enable only designated users to access digital contents. From the consumers' point of view, they have a tendency to go against complex and confusing limitations. Consumers want to enjoy contents without hassle and with as few limitations as possible. The concept of Authorized Domain (AD) was presented to remove such problems. However, the previous work on authorized domain has two problems. The first is that it requires a rather expensive revocation mechanism. The second is that the devices still can play contents which are previously obtained even though they are currently out of the authorized domain. On the contrary, our scheme prevents the content from being played by devices which are out of the domain for better security. Furthermore our scheme does not need to maintain a revocation list and can prevent replay attack.
UR - http://www.scopus.com/inward/record.url?scp=38049067781&partnerID=8YFLogxK
U2 - 10.1007/978-3-540-73547-2_16
DO - 10.1007/978-3-540-73547-2_16
M3 - Conference contribution
AN - SCOPUS:38049067781
SN - 9783540735465
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 135
EP - 145
BT - Autonomic and Trusted Computing - 4th International Conference, ATC 2007, Proceedings
PB - Springer Verlag
T2 - 4th International Conference on Autonomic and Trusted Computing: Bringing Safe, Self-x and Organic Computing Systems into Reality, ATC 2007
Y2 - 11 July 2007 through 13 July 2011
ER -