DocumentCode
2541424
Title
A DRM model based on proactive secret sharing scheme for P2P networks
Author
Ma, Ling ; Liu, Shouxun ; Wang, Yongbin
Author_Institution
Inst. of Inf. Security & Secure Broadcasting & Telev., Commun. Univ. of China, Beijing, China
fYear
2010
fDate
7-9 July 2010
Firstpage
859
Lastpage
862
Abstract
The development of P2P technology has brought a significant revolution to Internet, which effectively improves data-sharing in networks. However, it also enables piracy products to spread quickly all over the networks. Therefore, it is urgent to design digital rights management (DRM) for P2P network. Recently, many DRM products for P2P have been investigated, but there are some disadvantages. A new DRM model based on proactive secret sharing scheme is proposed in this paper. This verifiable DRM model ensures the validation of sub-keys. The model enables the users to obtain the key effectively and utilize the advantage of P2P networks.
Keywords
Internet; computer network security; digital rights management; peer-to-peer computing; public key cryptography; DRM model; Internet; P2P networks; data-sharing; digital rights management; peer-to-peer network; proactive secret sharing scheme; Computer hacking; Cryptography; Elliptic curves; Internet; Licenses; Peer to peer computing; DRM; P2P; proactive secret sharing; shamir threshold schemes;
fLanguage
English
Publisher
ieee
Conference_Titel
Cognitive Informatics (ICCI), 2010 9th IEEE International Conference on
Conference_Location
Beijing
Print_ISBN
978-1-4244-8041-8
Type
conf
DOI
10.1109/COGINF.2010.5599791
Filename
5599791
Link To Document