ACM Transactions on Computer Systems (TOCS)
Protecting digital media content
Communications of the ACM
Towards Multiple-Payment Schemes for Digital Money
FC '97 Proceedings of the First International Conference on Financial Cryptography
Fault Induction Attacks, Tamper Resistance, and Hostile Reverse Engineering in Perspective
FC '97 Proceedings of the First International Conference on Financial Cryptography
Tamper resistance: a cautionary note
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
Distributed digital-ticket management for rights trading system
Proceedings of the 1st ACM conference on Electronic commerce
Distributed access-rights management with delegation certificates
Secure Internet programming
An efficient software protection scheme
Sec '01 Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge
Intellectual Property Metering
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Protecting Software Code by Guards
DRM '01 Revised Papers from the ACM CCS-8 Workshop on Security and Privacy in Digital Rights Management
Succinct specifications of portable document access policies
Proceedings of the ninth ACM symposium on Access control models and technologies
Provable bounds for portable and flexible privacy-preserving access
Proceedings of the tenth ACM symposium on Access control models and technologies
Succinct representation of flexible and privacy-preserving access rights
The VLDB Journal — The International Journal on Very Large Data Bases
Some new approaches for preventing software tampering
Proceedings of the 44th annual Southeast regional conference
A digital rights enabled graphics processing system
GH '06 Proceedings of the 21st ACM SIGGRAPH/EUROGRAPHICS symposium on Graphics hardware
An adaptive approach to hardware alteration for digital rights management
WISA'04 Proceedings of the 5th international conference on Information Security Applications
Enabling fairer digital rights management with trusted computing
ISC'07 Proceedings of the 10th international conference on Information Security
Hi-index | 0.00 |
This paper describes public-key protocols for binding software licenses to tamper-resistant smart cards, for transferring licenses between cards, and for purchasing them on-line. The protocols support software distribution both through retail stores and over the Internet. The user can transfer licenses from several cards onto a single card to avoid juggling between several cards in the reader. The protocols are based on signed delegation certificates that are mostly stored outside the smart card. A smart card reader and cards capable of public-key signatures are the only new hardware needed. The protocols are easy for the user and simple to implement and analyze. We prove the security of the transfer protocol.