2001
DOI: 10.1007/3-540-47719-5_17
|View full text |Cite
|
Sign up to set email alerts
|

Secure and Private Distribution of Online Video and Some Related Cryptographic Issues

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2003
2003
2023
2023

Publication Types

Select...
3
3
2

Relationship

1
7

Authors

Journals

citations
Cited by 16 publications
(16 citation statements)
references
References 24 publications
0
16
0
Order By: Relevance
“…Commutative cipher has been widely used in the literature for various purposes, e.g. protecting secrecy and privacy in e-commerce [2], [3], [7], data mining, information sharing [1], [8], and network routing [13]. In this work, we adopt commutative encryption to wrap the payload in layers.…”
Section: B Commutative Encryptionmentioning
confidence: 99%
“…Commutative cipher has been widely used in the literature for various purposes, e.g. protecting secrecy and privacy in e-commerce [2], [3], [7], data mining, information sharing [1], [8], and network routing [13]. In this work, we adopt commutative encryption to wrap the payload in layers.…”
Section: B Commutative Encryptionmentioning
confidence: 99%
“…A viable method [11] is to encrypt the video with a secret video key in a symmetric cipher such as RC4 or AES, then encrypt the video key with the client's public key. With this improvement, the total computational cost is almost equal to that of symmetric encoding/decoding.…”
Section: Countermeasure and Improvementmentioning
confidence: 99%
“…For example, early work [17], [18], [19] considers how to speed up the decryption and encryption process. The scheme proposed in [11] relies on costly hardware support to deal with member collusion. A recent work [13] proposes a multi-key video proxy infrastructure without such a requirement.…”
Section: Related Workmentioning
confidence: 99%
“…Existing practice often uses pay-perview, membership, or DRM schemes [10] without considering effective utilization of proxy caching. Some recently developed strategies tried to leverage from proxy caching to deal with the problem with the aid of encryption mechanisms [11], [12], [13]. But they either demand special hardware support or cannot work if some clients collude.…”
Section: Introductionmentioning
confidence: 99%