Identity-based uploading content scheme in DRM

  • Authors:
  • Guan Peipei;Yang Yixian;Niu Xinxin;Ma Zhaofeng

  • Affiliations:
  • State Key Lab. of Networking and Switching Techn., Beijing Univ. of Posts and Telecomm., Key Lab. of Network and Inf. Attack & Defense Techn. of MOE, Natl. Eng. Lab. for Disaster Backup and Recove ...;State Key Lab. of Networking and Switching Techn., Beijing Univ. of Posts and Telecomm., Key Lab. of Network and Inf. Attack & Defense Techn. of MOE, Natl. Eng. Lab. for Disaster Backup and Recove ...;State Key Lab. of Networking and Switching Techn., Beijing Univ. of Posts and Telecomm., Key Lab. of Network and Inf. Attack & Defense Techn. of MOE, Natl. Eng. Lab. for Disaster Backup and Recove ...;State Key Lab. of Networking and Switching Techn., Beijing Univ. of Posts and Telecomm., Key Lab. of Network and Inf. Attack & Defense Techn. of MOE, Natl. Eng. Lab. for Disaster Backup and Recove ...

  • Venue:
  • WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper we introduce a new model "uploading content" in DRM and design a concrete scheme which is based on identity encrypt system and has ability to distinguish the malicious usrs from the honest with the characteristic of easy DDH in "weak" curves. The improved shceme is against chosenciphertext attack.