A Study on Distributed License Authorization System Based on Threshold Secret Sharing

Article Preview

Abstract:

With the rapid popularity of P2P networks, the demand for digital rights management (DRM) in P2P mode is increasing quickly. The research on issuance of digital content licenses is the key issues in DRM. As for the centralized authorization systems, the security and the efficiency have certain defects. An improved distributed license authorization system is presented in this paper. And the nodes in the system are divided into six kinds of roles in accordance with theirs functions and a new non-interactive verifiable secret sharing protocol is introduced. Because of the adoptions of threshold secret sharing mechanism and the independent synthesis peers, the system security is improved in the transmission of digital content license and the burden of nodes is reduced in P2P networks. Each license authorization node gets the correct secret sharing by the non-interactive verifiable secret sharing protocol.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2749-2752

Citation:

Online since:

August 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Routsellis-Theotokis S, Spinellis D. A Survey of peer-to-peer content distribution technologies [J]. ACM Computing Surveys, 2004, 36(4): 335-337.

DOI: 10.1145/1041680.1041681

Google Scholar

[2] Torrubia A, Mora F J, Marti L. Cryptography Regulations for E-commerce and Digital Rights Management[J]. Computers &Security, 2001, 20(8): 724-738.

DOI: 10.1016/s0167-4048(01)00814-8

Google Scholar

[3] Jonker W, Linnartz J P. Digital Rights Management in Consumer Electronics Products[J]. Signal Processing Magazine, 2004, 21(2): 82-91.

DOI: 10.1109/msp.2004.1276116

Google Scholar

[4] Bill Rosen blatt, BillTrippe, Stephen Mooney. Digital Right management: Business and Technology [M]. New York: M&T Book s, 2002: 83 - 84.

Google Scholar

[5] S. Q. Xiao, Z. D. Lu and H. F. Ling, A Trust-Scheme-Based DRM Model for P2P System, Computer Research and Development, vol. 44, 2007, pp.567-573.

DOI: 10.1360/crad20070404

Google Scholar

[6] Gong Haigang, Liu Ming. Research progress of P2P key technology of streaming media [J]. Computer research & development, 2005, 42 (12): 2033- (2040).

DOI: 10.1360/crad20051201

Google Scholar

[7] R. Rivets, A. Shamir and L. Adelman, A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, Communications of the ACM, vol. 21, Feb. 1978, pp.120-126.

DOI: 10.1145/359340.359342

Google Scholar

[8] H. Zhao, Based on P2P Streaming Media Digital Rights Management, Chongqing University, China, (2008).

Google Scholar

[9] A. Shamir, How to Share a Secret, Communications of the ACM, vol. 22, 1979, pp.612-613.

DOI: 10.1145/359168.359176

Google Scholar