|Table of Contents|

Application of Direct Anonymous Attestation in Trusted DRM(PDF)

《南京师大学报(自然科学版)》[ISSN:1001-4616/CN:32-1239/N]

Issue:
2014年01期
Page:
112-
Research Field:
计算机科学
Publishing date:

Info

Title:
Application of Direct Anonymous Attestation in Trusted DRM
Author(s):
Yue BaolingZhang GongxuanLi ChenHe Dinglong
Department of Computer Science and Engineering,Nanjing University of Science and Technology,Nanjing 210094,China
Keywords:
DRMtrusted DRMTPMzero-knowledge proofElGamal algorithm
PACS:
TP393
DOI:
-
Abstract:
Digital Rights Management(DRM)is a technology to protect digital contents from illegal usages after sale.DRM depends on soft cryptography protection,which is a weak protection against hackers.Trusted DRM applied TPM security chip to improve protection in terms of hardware for authentication,licensing and other aspects.To overcome the problem of user privacy,trusted DRM used direct anonymous authentication protocol.On this basis,this article proposed an improved protocol based on zero-knowledge proof and ElGamal signature algorithm of double random numbers,and then described its application in trusted DRM.The proposed technique could improve security and anonymity in DRM.

References:

[1] Zhang Zhiyong,Pei Qingqi,Ma Jianfeng,et al.Security and trust in digital rights management[J].International Journal of Network Security,2009,9(3):247-263.
[2]Jamkhedkar Pramod A,Heileman Gregory L.Digital rights management architectures[J].Computers and Electrical Engineering,2009,35(2):376-394.
[3]Liu Chenglian,Lin Chenglu,Harn Lien,et al.Security analysis of remote password authentication schemes for multi-server architecture using neural networks[J].Advanced Science Letters,2012,7(1):680-683.
[4]Debiao H E,Hao Hu.Cryptanalysis of a smartcard-based user authentication scheme for multi-server environments[J].IEICE Transations on Communications,2012,95(9):3 052-3 054.
[5]王尚平,杨春霞,王晓峰,等.基于双线性对的隐藏签名认证方案[J].电子与信息学报,2008,30(2):486-489.
[6]李超零,周雁舟,李立新,等.基于代理的隐私CA模型[J].信息工程大学学报,2010,11(1):113-117.
[7]宋成,孙宇琼,彭维平,等.改进的直接匿名认证方案[J].北京邮电大学学报,2011,34(3):62-65.
[8]Zhou F C,Xu J,Li H,et al.Group signature based on non-interactive zero-knowledge proofs[J].China Communications,2011,8(2):34-41.
[9]刘怀明,魏仕民.基于椭圆曲线的ElGamal型数字签名[J].吉林师范大学学报:自然科学版,2012,33(3):57-60.

Memo

Memo:
-
Last Update: 2014-03-30