Abstract
DRM systems provide a means for protecting digital content, but at the same time they violate the privacy of users in a number of ways. This paper addresses privacy issues in DRM systems. The main challenge is how to allow a user to interact with the system in an anonymous/pseudonymous way, while preserving all security requirements of usual DRM systems. To achieve this goal, the paper proposes a set of protocols and methods for managing user identities and interactions with the system during the process of acquiring and consuming digital content. Furthermore, a method that supports anonymous transfer of licenses is discussed. It allows a user to transfer a piece of content to another user without the content provider being able to link the two users. Finally, the paper demonstrates how to extend the rights of a given user to a group of users in a privacy preserving way. The extension hides the group structure from the content provider and at the same time provides privacy among the members of the group.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Apple iTunes, http://www.apple.com/itunes/
Windows Media 9 Series: Digital Rights Management (DRM), http://www.microsoft.com/windows/windowsmedia/drm/default.aspx
IBM’s Electronic Music Management System (EMMS), http://www-306.ibm.com/software/data/emms/
Open MagicGate, http://www.sony.net/Products/homeaudio/net_md/faq02.html
SmartRight, http://www.smartright.org/
Jonker, W., Linnartz, J.-P.: Digital rights management in consumer electronics products. IEEE Signal Processing Magazine 21(2), 82–91 (2004)
van den Heuvel, S.A.F.A., Jonker, W., Kamperman, F.L.A.J., Lenoir, P.J.: Secure Content Management in Authorised Domains. In: Proceedings of the International Broadcasting Convention, IBC (2002)
Feigenbaum, J., Freedman, M.J., Sander, T., Shostack, A.: Privacy Engineering for Digital Rights Management Systems. In: Proceedings of the ACM Workshop on Security and Privacy in Digital Rights Management (2001)
Conrado, C., Kamperman, F., Schrijen, G.J., Jonker, W.: Privacy in an Identity-based DRM System. In: Proceedings of the 14th International Workshop on Databases and Expert Systems Applications, Prague, Czech Republic (2003)
Lysyanskaya, A.: Pseudonymous Systems, Master’s Thesis at the Massachusetts Institute of Technology (June 1999)
Chaum, D.: Blind signatures for untraceable payments. In: Advances in Cryptology: Proceedings of Crypto 1982, Springer, Heidelberg (1982)
Zhang, F., Kim, K.: ID-Based Blind Signature and Ring Signature from Pairings. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 533–547. Springer, Heidelberg (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Conrado, C., Petković, M., Jonker, W. (2004). Privacy-Preserving Digital Rights Management. In: Jonker, W., Petković, M. (eds) Secure Data Management. SDM 2004. Lecture Notes in Computer Science, vol 3178. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30073-1_7
Download citation
DOI: https://doi.org/10.1007/978-3-540-30073-1_7
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-22983-4
Online ISBN: 978-3-540-30073-1
eBook Packages: Springer Book Archive