[1]岳宝玲,张功萱,李 晨,等.可信DRM中直接匿名认证的应用研究[J].南京师大学报(自然科学版),2014,37(01):112.
 Yue Baoling,Zhang Gongxuan,Li Chen,et al.Application of Direct Anonymous Attestation in Trusted DRM[J].Journal of Nanjing Normal University(Natural Science Edition),2014,37(01):112.
点击复制

可信DRM中直接匿名认证的应用研究()
分享到:

《南京师大学报(自然科学版)》[ISSN:1001-4616/CN:32-1239/N]

卷:
第37卷
期数:
2014年01期
页码:
112
栏目:
计算机科学
出版日期:
2014-03-30

文章信息/Info

Title:
Application of Direct Anonymous Attestation in Trusted DRM
作者:
岳宝玲张功萱李 晨贺定龙
南京理工大学计算机科学与工程学院,江苏 南京 210094
Author(s):
Yue BaolingZhang GongxuanLi ChenHe Dinglong
Department of Computer Science and Engineering,Nanjing University of Science and Technology,Nanjing 210094,China
关键词:
DRM可信DRMTPM零知识认证ElGamal算法
Keywords:
DRMtrusted DRMTPMzero-knowledge proofElGamal algorithm
分类号:
TP393
文献标志码:
A
摘要:
数字版权管理(DRM)技术一直致力于数字内容的保护,特别是防止售后非法使用.而所依靠的密码学保护措施很容易被攻击和破解.为了在硬件方面加入保护,可信DRM引入了TPM安全芯片,借助TPM在身份认证、许可授权等方面加强保护.为了解决身份认证时用户隐私泄露的问题,可信DRM采用了直接匿名认证协议.在此基础上提出了基于零知识认证和ElGamal算法的双随机数签名的改进方案,并介绍了该方案在可信DRM中是如何应用的.最后经过分析得出该方案在安全性和匿名性方面都有所提高.
Abstract:
Digital Rights Management(DRM)is a technology to protect digital contents from illegal usages after sale.DRM depends on soft cryptography protection,which is a weak protection against hackers.Trusted DRM applied TPM security chip to improve protection in terms of hardware for authentication,licensing and other aspects.To overcome the problem of user privacy,trusted DRM used direct anonymous authentication protocol.On this basis,this article proposed an improved protocol based on zero-knowledge proof and ElGamal signature algorithm of double random numbers,and then described its application in trusted DRM.The proposed technique could improve security and anonymity in DRM.

参考文献/References:

[1] Zhang Zhiyong,Pei Qingqi,Ma Jianfeng,et al.Security and trust in digital rights management[J].International Journal of Network Security,2009,9(3):247-263.
[2]Jamkhedkar Pramod A,Heileman Gregory L.Digital rights management architectures[J].Computers and Electrical Engineering,2009,35(2):376-394.
[3]Liu Chenglian,Lin Chenglu,Harn Lien,et al.Security analysis of remote password authentication schemes for multi-server architecture using neural networks[J].Advanced Science Letters,2012,7(1):680-683.
[4]Debiao H E,Hao Hu.Cryptanalysis of a smartcard-based user authentication scheme for multi-server environments[J].IEICE Transations on Communications,2012,95(9):3 052-3 054.
[5]王尚平,杨春霞,王晓峰,等.基于双线性对的隐藏签名认证方案[J].电子与信息学报,2008,30(2):486-489.
[6]李超零,周雁舟,李立新,等.基于代理的隐私CA模型[J].信息工程大学学报,2010,11(1):113-117.
[7]宋成,孙宇琼,彭维平,等.改进的直接匿名认证方案[J].北京邮电大学学报,2011,34(3):62-65.
[8]Zhou F C,Xu J,Li H,et al.Group signature based on non-interactive zero-knowledge proofs[J].China Communications,2011,8(2):34-41.
[9]刘怀明,魏仕民.基于椭圆曲线的ElGamal型数字签名[J].吉林师范大学学报:自然科学版,2012,33(3):57-60.

备注/Memo

备注/Memo:
收稿日期:2013-10-20.
基金项目:国家自然科学基金(61272420).
通讯联系人:岳宝玲,硕士研究生,研究方向:Web Services和信息安全.E-mail:756291527@qq.com
更新日期/Last Update: 2014-03-30