Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Can P3P help to protect privacy worldwide?
MULTIMEDIA '00 Proceedings of the 2000 ACM workshops on Multimedia
Identity management and its support of multilateral security
Computer Networks: The International Journal of Computer and Telecommunications Networking
Digital Rights Management: Business and Technology
Digital Rights Management: Business and Technology
Digital Signcryption or How to Achieve Cost(Signature & Encryption)
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
Universally Composable Adaptive Priced Oblivious Transfer
Pairing '09 Proceedings of the 3rd International Conference Palo Alto on Pairing-Based Cryptography
Privacy protection in PKIs: a separation-of-authority approach
WISA'06 Proceedings of the 7th international conference on Information security applications: PartI
Hi-index | 0.00 |
The aim of strong digital rights management (DRM) is to enforce usage rules in end-user devices on behalf of content providers. Strong DRM is not well accepted by customers. Moreover, strong DRM is repeatedly circumvented and broken. Since Napster (and all its Peer-to-Peer follow-ups), the Internet is flooded with illegal digital content. We introduce the LWDRM technology as an alternative model. LWDRM relies on responsible behavior of customers. However, LWDRM contains a privacy problem, in that users sign media files which they wish to transfer freely from one place to the other. In this paper, we will explain the basic idea of the LWDRM technology and we will discuss the related privacy problem. We will show that there are methods to use LWDRM technology in compliance with privacy requirements of the users. A simple approach to harmonize LWDRM with privacy is separation-of-duty between certification authorities and content providers. Other, even more advanced models can be realized as well.