Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Towards a software architecture for DRM
Proceedings of the 5th ACM workshop on Digital rights management
Secure and Flexible Digital Rights Management in a Pervasive Usage Mode
CIS '07 Proceedings of the 2007 International Conference on Computational Intelligence and Security
Hi-index | 0.00 |
In this paper we introduce a new model "uploading content" in DRM and design a concrete scheme which is based on identity encrypt system and has ability to distinguish the malicious usrs from the honest with the characteristic of easy DDH in "weak" curves. The improved shceme is against chosenciphertext attack.