Browse > Article

A License Administration Protocol Providing User Privacy in Digital Rights Management  

박복녕 (고려대학교 컴퓨터학과)
김태윤 (고려대학교 컴퓨터학과)
Abstract
As people are damaged increasingly by personal information leakage, awareness about user privacy infringement is increasing. However, the existing DRM system does not support the protection of user's personal information because it is not necessary for the protection of copyrights. This paper is suggesting a license administration protocol which is more powerful to protect personal information in DRM. To protect the exposure of users identifier, this protocol uses temporary ID and token to guarantee anonymity and it uses a session key by ECDH to cryptography and Public-Key Cryptosystem for a message so that it can protect the exposure of personal information and user's privacy.
Keywords
DRM; Public-Key Cryptosvstem; Anonymity; Privacy; License;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Microsoft : http://www.microsoft.com/windows/windowsmedia/drm.asp
2 J. Dubl, 'Digital Rights Management: A Definition,' IDC, 2001
3 J. Dubl, S. Kevorkian, 'Understanding DRM System: An IDC White paper', IDC, 2001
4 Intertrust : http://www.interturst.com
5 P. Vora, D. Reynolds, L. Dickinson, J. Erickson, D. Banks, 'Privacy and Digital Rights Management,' A position paper for the W3C Workshop on Digital Rights Management, January 2001
6 J. Feigenbaum, M. J. Freedman, T. Sander, A. Shostack, 'Privacy Engineering for Digital Rights Management Systems,' Workshop on Security and Privacy in Digital Rights Management, November 2001
7 ANSI X9.63 : Public key cryptography for the financial services industry : Key agreement and key transport using elliptic curve cryptography, ANSI, X9.63-199x draft, January 1999
8 ITU-T Recommendation X.509: Information Technology-Open Systems Inter-connection-The Directory: Authentication Framework
9 Aucsmith, D., 'Tamper Resistant Software: An Implementation,' in Anderson, R., ed., Information Hiding, First International Workshop, Cambridge, UK., Springer- Verlag Lecture Notes in Computer Science, Vol. 1174, pp. 317-333, May 1996   DOI   ScienceOn
10 J.M.Jeon, S.J.Park, B.C.Kim, D.H.Won, 'DRM Security Framework - ID Base Approach for Content Super-Distributions,' IDS, July 2001
11 Certicom Corp., 'Remarks on the security of the Elliptic curve cryptosystem,' 2000., http://www. certicom.com
12 R. Molva, G. Tsudik, E. Van Herreweghen, S. Zatti, 'KryptoKnight Authentication and Key Distribution System,' Proceeding of ESORICS'92, November 1992
13 Brd J. Cox, 'Superdistribution: Objects As Property on the Electronic Frontier,' Addision-Wesley, May 1996
14 A. Menezes, P. van Oorschot, S. Vanstone, Handbook of Applied Cryptography, CRC Press, 1997
15 Stefan Brands, 'Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy,' MIT Press, August 2000
16 Julio Lopez and Ricardo Dahab, 'Performance of Elliptic Curve Cryptosysterns,' Technical report IC-00-08, 2000., http://www.dcc.unicamp.br/icmain/publications-e.html
17 C. H. Lim and P. J. Lee., 'A Key Recovery Attack on Discrete Log-based Schemes Using a Prime Order Subgroup,' In Advances in Cryptology: Crypto '97m B. S. Kaliski, Jr., Ed., Lecture Notes in Computer Science 1294, Springer-Varlag. pp. 249-263, 1997
18 Schneier, Bruce., Applied Cryptography, Second Edition, Essential reference for cryptographic engineers by the foremost pundit in the field, Wiley, 1996