Abstract
In order for the Internet-based digital products to be widely accepted, secure copyright distribution mechanism must be provided with advanced traitor tracing mechanism.We present new software copyright protection and electronic license distribution model based on public key scheme. In this model, digital contents can be distributed over a broadcast channel in a encrypted form and the authorized user can decrypt it, which can be traced back with proposed public key tracing mechanism. Proposed model provides efficiency since merchant server can issue electronic licenses in advance by preprocessing. It also provides secure and efficient software live-update mechanism based on traitor tracing scheme.1
This work is supported in part by the Ministry of Information & Communication of KOREA (“Support Project of University Information Technology Research Center” supervised by KIPA)
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
A. Fiat and A. Shamir: How to Prove Yourself: Practical Solutions to Identification and Signature problems, Advances in Cryptology-CRYPTO’ 86, LNCS Proceedings, Springer-Verlag, pp.186–194, 1987.
A. Fiat and A. Shamir: Unforgeable Proofs of Identity, Proceedings of Securicom’87, Paris, pp.147–153, 1987.
A. W. Roscoe, M. H. Goldsmith: The Perfect’ spy’ for model checking cryptoprotocols, In Proceedings of the DIMACS Workshopon Design and Formal Verification of Security Protocols, 1997
Alfred J. Menezed, Paul C. van Oorschot, Scott A. Vanstone (ed.): Handbook of Applied Cryptography, CRC Press, 1996.
B. Chor, A. Fiat and M. Naor: Tracing Traitors, Advances in Cryptology-CRYPTO’94, LNCS Proceedings, Springer-Verlag, pp.257–262, 1995.
B. Pfitzmann: Trials of Traced Traitors, Information Hiding, First International Workshop, LNCS Proceedings, Springer-Verlag, pp.49–64, 1996.
B. Pfitzmann, M. Waidner: Asymmetric Fingerprinting for Larger Collusions, IBM Research Report, 1996.
T. ElGamal: A Public Key Cryptosystem and a Signature Scheme based on Discrete Logarithm, IEEE Transactions on Information Theory, Vol. IT-30, No. 4, pp.469–472, 1985.
D. Boneh, M. Franklin: An Efficient Public Key Traitor Tracing Scheme, Advances in Cryptology-CRYPTO’ 99, LNCS Proceedings, Springer-Verlag, pp.338–353, 1999.
D. Boneh, J. Shaw: Collusion-Secure Fingerprinting for Digital Data, Advances in Cryptology-CRYPTO’ 95, LNCS Proceedings, Springer-Verlag, pp.452–465, 1995.
B. Schneier: Applied Cryptography, Second Edition, Wiley, 1996.
W. Diffie, M. Hellman: New Directions in Cryptography, IEEE Transactions on Information Theory, Vol. IT-22, No. 6, pp.472–492, 1976.
K. Kurosawa, Y. Desmedt: Optimun Traitor Tracing and Asymmetric Schemes, Advances in Cryptology-EUROCRYPT’ 98, LNCS Proceedings, Springer-Verlag, 1999.
M. Rabin: How to Exchange Secrets by Oblivious Transfer, Technical Reports TR-81, Harvard Aiken Computation Laboratory, 1981.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lee, HW., Lee, SM., Lee, IY. (2002). Secure Electronic Copyright Distribution with Public Key Based Traitor Tracing. In: Bauknecht, K., Tjoa, A.M., Quirchmayr, G. (eds) E-Commerce and Web Technologies. EC-Web 2002. Lecture Notes in Computer Science, vol 2455. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45705-4_34
Download citation
DOI: https://doi.org/10.1007/3-540-45705-4_34
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-44137-3
Online ISBN: 978-3-540-45705-3
eBook Packages: Springer Book Archive