• DocumentCode
    2541424
  • Title

    A DRM model based on proactive secret sharing scheme for P2P networks

  • Author

    Ma, Ling ; Liu, Shouxun ; Wang, Yongbin

  • Author_Institution
    Inst. of Inf. Security & Secure Broadcasting & Telev., Commun. Univ. of China, Beijing, China
  • fYear
    2010
  • fDate
    7-9 July 2010
  • Firstpage
    859
  • Lastpage
    862
  • Abstract
    The development of P2P technology has brought a significant revolution to Internet, which effectively improves data-sharing in networks. However, it also enables piracy products to spread quickly all over the networks. Therefore, it is urgent to design digital rights management (DRM) for P2P network. Recently, many DRM products for P2P have been investigated, but there are some disadvantages. A new DRM model based on proactive secret sharing scheme is proposed in this paper. This verifiable DRM model ensures the validation of sub-keys. The model enables the users to obtain the key effectively and utilize the advantage of P2P networks.
  • Keywords
    Internet; computer network security; digital rights management; peer-to-peer computing; public key cryptography; DRM model; Internet; P2P networks; data-sharing; digital rights management; peer-to-peer network; proactive secret sharing scheme; Computer hacking; Cryptography; Elliptic curves; Internet; Licenses; Peer to peer computing; DRM; P2P; proactive secret sharing; shamir threshold schemes;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Cognitive Informatics (ICCI), 2010 9th IEEE International Conference on
  • Conference_Location
    Beijing
  • Print_ISBN
    978-1-4244-8041-8
  • Type

    conf

  • DOI
    10.1109/COGINF.2010.5599791
  • Filename
    5599791