Security without identification: transaction systems to make big brother obsolete
Communications of the ACM
A public key cryptosystem and a signature scheme based on discrete logarithms
Proceedings of CRYPTO 84 on Advances in cryptology
Identity-Based Encryption from the Weil Pairing
SIAM Journal on Computing
Communications of the ACM - Digital rights management
Improved proxy re-encryption schemes with applications to secure distributed storage
ACM Transactions on Information and System Security (TISSEC)
Introduction to Modern Cryptography (Chapman & Hall/Crc Cryptography and Network Security Series)
Introduction to Modern Cryptography (Chapman & Hall/Crc Cryptography and Network Security Series)
Tor: the second-generation onion router
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Proceedings of the 9th Symposium on Identity and Trust on the Internet
A secure and mutual-profitable DRM interoperability scheme
ISCC '10 Proceedings of the The IEEE symposium on Computers and Communications
Privacy-Preserving DRM for Cloud Computing
WAINA '12 Proceedings of the 2012 26th International Conference on Advanced Information Networking and Applications Workshops
Unlinkable content playbacks in a multiparty DRM system
DBSec'13 Proceedings of the 27th international conference on Data and Applications Security and Privacy XXVII
A privacy-friendly architecture for future cloud computing
International Journal of Grid and Utility Computing
Hi-index | 0.00 |
In a cloud-computing scenario where users buy software from software providers and execute it at computing centers, a digital rights management (DRM) system has to be in place to check the software licenses during each software execution. However, the exposure of users to privacy invasion in the presence of DRM systems is problematic. We come up with a concept that unites software providers' and users' demands for a secure and privacy-preserving DRM system for cloud computing. The employment of proxy re-encryption allows for a prevention of profile building (under pseudonym) of users by any party.