Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Diffie-Hellman key distribution extended to group communication
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
Key Agreement in Dynamic Peer Groups
IEEE Transactions on Parallel and Distributed Systems
Communications of the ACM
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
CLIQUES: A New Approach to Group Key Agreement
ICDCS '98 Proceedings of the The 18th International Conference on Distributed Computing Systems
Secure communications for cluster-based ad hoc networks using node identities
Journal of Network and Computer Applications
TLMS: A Novel DRM Scheme for Multimedia Sharing in P2P Networks
IIH-MSP '09 Proceedings of the 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing
Blinding for unanticipated signatures
EUROCRYPT'87 Proceedings of the 6th annual international conference on Theory and application of cryptographic techniques
Hi-index | 0.00 |
Peer-to-Peer (P2P) systems enable efficient multimedia file sharing and are inherently scalable on the Internet. However, the absence of a centralized authority and a suitable Digital Right Management (DRM) mechanism prompts many securities-related challenges and discourages the widespread use of P2P networks for distributing copyright-protected multimedia files. To address these issues, we adopt the concept of a group Diffie-Hellman group key and threshold scheme to propose a novel anonymous DRM scheme for P2P users that wish to share multimedia files. Our scheme has four features: (1) the P2P users remain anonymous while sharing their files, (2) no online server is needed to perform the DRM operations, (3) an adjustable mechanism exists for efficiently distributing multimedia files with different popularities, and (4) users enjoy low communication and computation costs. In addition to explaining the operations of this scheme, we also compare its performance and security with Zhang et al.'s design, TLMS and Lua's Scheme within the context of this study.