A DRM security architecture for home networks
Proceedings of the 4th ACM workshop on Digital rights management
Import/export in digital rights management
Proceedings of the 4th ACM workshop on Digital rights management
Provably secure delegation-by-certification proxy signature schemes
InfoSecu '04 Proceedings of the 3rd international conference on Information security
Enabling DRM-Preserving Digital Content Redistribution
CEC '05 Proceedings of the Seventh IEEE International Conference on E-Commerce Technology
Proxy re-signatures: new definitions, algorithms, and applications
Proceedings of the 12th ACM conference on Computer and communications security
DRM interoperability analysis from the perspective of a layered framework
Proceedings of the 5th ACM workshop on Digital rights management
Achieving media portability through local content translation and end-to-end rights management
Proceedings of the 5th ACM workshop on Digital rights management
Towards a software architecture for DRM
Proceedings of the 5th ACM workshop on Digital rights management
Design rules for interoperable domains: controlling content dilution and content sharing
Proceedings of the 8th ACM workshop on Digital rights management
Problem Analyses and Recommendations in DRM Security Policies
EuroISI '08 Proceedings of the 1st European Conference on Intelligence and Security Informatics
Protection Profile for Connected Interoperable DRM Framework
Information Security Applications
CCA-Secure Proxy Re-encryption without Pairings
Irvine Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC '09
Key-Private Proxy Re-encryption
CT-RSA '09 Proceedings of the The Cryptographers' Track at the RSA Conference 2009 on Topics in Cryptology
Secure Domain Architecture for Interoperable Content Distribution
PCM '09 Proceedings of the 10th Pacific Rim Conference on Multimedia: Advances in Multimedia Information Processing
Proxy re-signature schemes without random oracles
INDOCRYPT'07 Proceedings of the cryptology 8th international conference on Progress in cryptology
Scalable DRM system for media portability
ASIAN'07 Proceedings of the 12th Asian computing science conference on Advances in computer science: computer and network security
Multi-use and unidirectional identity-based proxy re-encryption schemes
Information Sciences: an International Journal
The security model of unidirectional proxy re-signature with private re-signature key
ACISP'10 Proceedings of the 15th Australasian conference on Information security and privacy
Achieving key privacy without losing CCA security in proxy re-encryption
Journal of Systems and Software
DRMFS: A file system layer for transparent access semantics of DRM-protected contents
Journal of Systems and Software
CCA proxy re-encryption without bilinear maps in the standard model
PKC'10 Proceedings of the 13th international conference on Practice and Theory in Public Key Cryptography
Secure interoperable digital content distribution mechanisms in a multi-domain architecture
Multimedia Tools and Applications
Privacy rights management in multiparty multilevel DRM system
Proceedings of the International Conference on Advances in Computing, Communications and Informatics
Hi-index | 0.00 |
In this paper we look at the problem of interoperability of digital rights management (DRM)systems in home networks. We introduce an intermediate module called the Domain Interoperability Manager (DIM) to efficiently deal with the problem of content and license translation across different DRM regimes. We also consider the threat model specific to interoperability systems, and introduce threats such as the cross-compliancy and splicing attacks. We formalize the adversary model and define security of an interoperable DRM system with respect to this adversary. We finalize by proposing detailed protocols which achieve our security requirements. In order to achieve these requirements we provide novel applications of recently proposed proxy resignature and proxy re-encryption algorithms.