Skip to main content

Fail-Stop Authentication Protocol for Digital Rights Management in Adaptive Information Retrieval System

  • Conference paper
  • 891 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3129))

Abstract

Digital Rights Management (DRM) is one of the most important issues in digital library, however it is difficult to balance security and efficiency of DRM system in open network environment, especially when the environment is unauthentic. In this paper, a new and Secure Authentication protocol for Digital Rights Management (SADIRM) is proposed to provide perfect usage control and fair transaction in adaptive information retrieval system, in which a License Finite States Machine (LFSM) is adopted to manage the digital rights under a third part Certificate Authority (CA), thus it is secure and fair for atomic authorization and forced revocation of license dynamically. During the interaction of all transaction stages, a fail-stop digital signature is used for identity authentication, integrity verification, and undeniability. Analysis manifests the proposed protocol is feasible, secure with high integrity and it provides a new and reliable approach for DRM.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bordoloi, B., Ilami, P., Mykytyn, P.P., Mykytyn, K.: Copyrighting computer software: The “look and feel” controversy and beyond. Information & Management 30(5), 211–221 (1993)

    Article  Google Scholar 

  2. Milagros, D.C.: Copyright in the digital environment. International Information and Library Review 29(2), 201–204 (1997)

    Article  Google Scholar 

  3. Su, J.K., Hartung, F., Girod, B.: Digital watermarking of text, image, and video documents. Computers & Graphics 22(6), 687–695 (1998)

    Article  Google Scholar 

  4. Lin, P.L.: Digital watermarking models for resolving rightful ownership and authenticating legitimate customer. Journal of Systems and Software 55(3), 261–271 (2001)

    Article  Google Scholar 

  5. Eskicioglu, A.M., Delp, E.J.: An overview of multimedia content protection in consumer electronics devices. Signal Processing: Image Communication 16(7), 681–699 (2001)

    Article  Google Scholar 

  6. Waller, A.O., Jones, G., Whitley, T., Edwards, J., Kaleshi, D., Munro, A., MacFarlane, B., Wood, A.: Securing the delivery of digital content over the Internet. Electronics & Communication Engineering Journal 14(5), 239–248 (2002)

    Article  Google Scholar 

  7. Lee, W.B., Chen, T.H.: A public verifiable copy protection technique for still images. Journal of Systems and Software 62(3), 195–204 (2002)

    Article  Google Scholar 

  8. Eskicioglu, A.M., Delp, E.J.: An overview of multimedia content protection in consumer electronics devices. Signal Processing: Image Communication 16(7), 681–699 (2001)

    Article  Google Scholar 

  9. Biehl, I., Meyer, B.: Cryptographic methods for collusion-secure fingerprinting of digital data. Computers and Electrical Engineering 28(1), 59–75 (2002)

    Article  MATH  Google Scholar 

  10. Oz, E.: Acceptable protection of software intellectual property: a survey of software developers and lawyers. Information & Management 34(3), 161–173 (1998)

    Article  MathSciNet  Google Scholar 

  11. Yoon, K.: The optimal level of copyright protection. Information Economics and Policy 14(3), 327–348 (2002)

    Article  Google Scholar 

  12. Schneier, B.: Applied cryptography-protocols, algorithm and source code in C, 2nd edn. John Wiley & Sons Inc., New York (1996)

    Google Scholar 

  13. van Heyst, E., Pedersen, T.P., Pfitzmann, B.: New constructions of fail-stop signatures and lower bounds. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 15–30. Springer, Heidelberg (1993)

    Google Scholar 

  14. van Heyst, E., Pedersen, T.P.: How to make efficient fail-stop signatures. In: Rueppel, R.A. (ed.) EUROCRYPT 1992. LNCS, vol. 658, pp. 366–377. Springer, Heidelberg (1993)

    Chapter  Google Scholar 

  15. Damgard, I.B., Pedersen, T.P., Pfitzmann: On the existence of statistically hiding bit commitment schemes and fail-stop signature. Journal of Cryptology 10, 163–194 (1997)

    Article  MATH  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ma, Z., Feng, B. (2004). Fail-Stop Authentication Protocol for Digital Rights Management in Adaptive Information Retrieval System. In: Li, Q., Wang, G., Feng, L. (eds) Advances in Web-Age Information Management. WAIM 2004. Lecture Notes in Computer Science, vol 3129. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-27772-9_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-27772-9_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-22418-1

  • Online ISBN: 978-3-540-27772-9

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics