Skip to main content

Secure Electronic Copyright Distribution with Public Key Based Traitor Tracing

  • Conference paper
  • First Online:
  • 774 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2455))

Abstract

In order for the Internet-based digital products to be widely accepted, secure copyright distribution mechanism must be provided with advanced traitor tracing mechanism.We present new software copyright protection and electronic license distribution model based on public key scheme. In this model, digital contents can be distributed over a broadcast channel in a encrypted form and the authorized user can decrypt it, which can be traced back with proposed public key tracing mechanism. Proposed model provides efficiency since merchant server can issue electronic licenses in advance by preprocessing. It also provides secure and efficient software live-update mechanism based on traitor tracing scheme.1

This work is supported in part by the Ministry of Information & Communication of KOREA (“Support Project of University Information Technology Research Center” supervised by KIPA)

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. A. Fiat and A. Shamir: How to Prove Yourself: Practical Solutions to Identification and Signature problems, Advances in Cryptology-CRYPTO’ 86, LNCS Proceedings, Springer-Verlag, pp.186–194, 1987.

    Google Scholar 

  2. A. Fiat and A. Shamir: Unforgeable Proofs of Identity, Proceedings of Securicom’87, Paris, pp.147–153, 1987.

    Google Scholar 

  3. A. W. Roscoe, M. H. Goldsmith: The Perfect’ spy’ for model checking cryptoprotocols, In Proceedings of the DIMACS Workshopon Design and Formal Verification of Security Protocols, 1997

    Google Scholar 

  4. Alfred J. Menezed, Paul C. van Oorschot, Scott A. Vanstone (ed.): Handbook of Applied Cryptography, CRC Press, 1996.

    Google Scholar 

  5. B. Chor, A. Fiat and M. Naor: Tracing Traitors, Advances in Cryptology-CRYPTO’94, LNCS Proceedings, Springer-Verlag, pp.257–262, 1995.

    Google Scholar 

  6. B. Pfitzmann: Trials of Traced Traitors, Information Hiding, First International Workshop, LNCS Proceedings, Springer-Verlag, pp.49–64, 1996.

    Google Scholar 

  7. B. Pfitzmann, M. Waidner: Asymmetric Fingerprinting for Larger Collusions, IBM Research Report, 1996.

    Google Scholar 

  8. T. ElGamal: A Public Key Cryptosystem and a Signature Scheme based on Discrete Logarithm, IEEE Transactions on Information Theory, Vol. IT-30, No. 4, pp.469–472, 1985.

    Article  MathSciNet  Google Scholar 

  9. D. Boneh, M. Franklin: An Efficient Public Key Traitor Tracing Scheme, Advances in Cryptology-CRYPTO’ 99, LNCS Proceedings, Springer-Verlag, pp.338–353, 1999.

    Google Scholar 

  10. D. Boneh, J. Shaw: Collusion-Secure Fingerprinting for Digital Data, Advances in Cryptology-CRYPTO’ 95, LNCS Proceedings, Springer-Verlag, pp.452–465, 1995.

    Google Scholar 

  11. B. Schneier: Applied Cryptography, Second Edition, Wiley, 1996.

    Google Scholar 

  12. W. Diffie, M. Hellman: New Directions in Cryptography, IEEE Transactions on Information Theory, Vol. IT-22, No. 6, pp.472–492, 1976.

    MathSciNet  Google Scholar 

  13. K. Kurosawa, Y. Desmedt: Optimun Traitor Tracing and Asymmetric Schemes, Advances in Cryptology-EUROCRYPT’ 98, LNCS Proceedings, Springer-Verlag, 1999.

    Google Scholar 

  14. M. Rabin: How to Exchange Secrets by Oblivious Transfer, Technical Reports TR-81, Harvard Aiken Computation Laboratory, 1981.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lee, HW., Lee, SM., Lee, IY. (2002). Secure Electronic Copyright Distribution with Public Key Based Traitor Tracing. In: Bauknecht, K., Tjoa, A.M., Quirchmayr, G. (eds) E-Commerce and Web Technologies. EC-Web 2002. Lecture Notes in Computer Science, vol 2455. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45705-4_34

Download citation

  • DOI: https://doi.org/10.1007/3-540-45705-4_34

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-44137-3

  • Online ISBN: 978-3-540-45705-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics