Attribute-based encryption for commercial content distribution

Hyoseung Kim, Seunghwan Park, Jong Hwan Park, Dong Hoon Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

There is growing need for digital content distribution system in the IPTV market so that the content providers can make digital content available to users in a controlled manner. Digital right management technologies allow being able to restrict access to a content giving an access policy so content is available only to fair user. However, such a previous system has some problem in terms of management of user's access information and computational cost for server. One of solutions to overcome the abovementioned problem is attribute-based encryption scheme providing access control to the encryption system. In this paper, we propose attribute based encryption scheme which is useful in contents distribution for IPTV, DVD and access control in encrypted file systems. Our attribute based encryption scheme allows for AND, OR, threshold and wildcard operations over attribute. Furthermore, our scheme achieves 0(1) pairings for decryption, regardless of any number of attributes.

Original languageEnglish
Title of host publicationIT Convergence and Security 2012
Pages205-213
Number of pages9
DOIs
Publication statusPublished - 2013
EventInternational Conference on IT Convergence and Security, ICITCS 2012 - Pyeong Chang, Korea, Republic of
Duration: 2012 Dec 52012 Dec 7

Publication series

NameLecture Notes in Electrical Engineering
Volume215 LNEE
ISSN (Print)1876-1100
ISSN (Electronic)1876-1119

Other

OtherInternational Conference on IT Convergence and Security, ICITCS 2012
Country/TerritoryKorea, Republic of
CityPyeong Chang
Period12/12/512/12/7

Keywords

  • Access control
  • Attribute based encryption
  • Content distribution
  • Digital content

ASJC Scopus subject areas

  • Industrial and Manufacturing Engineering

Fingerprint

Dive into the research topics of 'Attribute-based encryption for commercial content distribution'. Together they form a unique fingerprint.

Cite this