Abstract
Applications that incorporate Digital Rights Management (DRM) capabilities are enabled to specify, implement and manage the rights and permissions associated with the use of intangible goods. Many different inter-related technologies can be incorporated into DRM enabled applications including technology that incorporates public key cryptography. The success of DRM enabled applications will depend on how well the solutions satisfy requirements of the different stakeholders involved with the production, distribution and use of intangible goods. A key success factor is the ability of an application to provide superior ease of use from the end user’s perspective. The success also depends on how well the application can adapt to new technology and emerging distribution and business models. This paper describes DRM applications, the requirements of the different stakeholders in this environment and critical attributes of public key cryptosystems that must be considered to ensure effective solutions.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Wyant, J. (2002). Applicability of Public Key Cryptosystems to Digital Rights Management Applications. In: Syverson, P. (eds) Financial Cryptography. FC 2001. Lecture Notes in Computer Science, vol 2339. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-46088-8_8
Download citation
DOI: https://doi.org/10.1007/3-540-46088-8_8
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-44079-6
Online ISBN: 978-3-540-46088-6
eBook Packages: Springer Book Archive