2012
DOI: 10.1007/978-3-642-34135-9_31
|View full text |Cite
|
Sign up to set email alerts
|

Towards a Secure, Transparent and Privacy-Preserving DRM System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 16 publications
0
2
0
Order By: Relevance
“…However, this system does not address how malicious consumers could be identified! Mishra et al (2012) proposed a privacy-preserving multiparty DRM system in [21] that is based on the secret sharing scheme, where no party has the complete decryption key. In this system, the distributor plays the middle-man role that exchanges the messages between the owner and the consumer.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…However, this system does not address how malicious consumers could be identified! Mishra et al (2012) proposed a privacy-preserving multiparty DRM system in [21] that is based on the secret sharing scheme, where no party has the complete decryption key. In this system, the distributor plays the middle-man role that exchanges the messages between the owner and the consumer.…”
Section: Introductionmentioning
confidence: 99%
“…However, the computational overhead endured by the system is significantly high that affects its adoption, for example, in mobile computing. The work in [21] preserves the anonymity of the consumer by the utilisation of TTP which we believe is time-consuming and could be (i.e. TTP) taken off the system as found in the other proposals.…”
Section: Introductionmentioning
confidence: 99%