Title :
A DRM model based on proactive secret sharing scheme for P2P networks
Author :
Ma, Ling ; Liu, Shouxun ; Wang, Yongbin
Author_Institution :
Inst. of Inf. Security & Secure Broadcasting & Telev., Commun. Univ. of China, Beijing, China
Abstract :
The development of P2P technology has brought a significant revolution to Internet, which effectively improves data-sharing in networks. However, it also enables piracy products to spread quickly all over the networks. Therefore, it is urgent to design digital rights management (DRM) for P2P network. Recently, many DRM products for P2P have been investigated, but there are some disadvantages. A new DRM model based on proactive secret sharing scheme is proposed in this paper. This verifiable DRM model ensures the validation of sub-keys. The model enables the users to obtain the key effectively and utilize the advantage of P2P networks.
Keywords :
Internet; computer network security; digital rights management; peer-to-peer computing; public key cryptography; DRM model; Internet; P2P networks; data-sharing; digital rights management; peer-to-peer network; proactive secret sharing scheme; Computer hacking; Cryptography; Elliptic curves; Internet; Licenses; Peer to peer computing; DRM; P2P; proactive secret sharing; shamir threshold schemes;
Conference_Titel :
Cognitive Informatics (ICCI), 2010 9th IEEE International Conference on
Conference_Location :
Beijing
Print_ISBN :
978-1-4244-8041-8
DOI :
10.1109/COGINF.2010.5599791