2013 IEEE 10th Consumer Communications and Networking Conference (CCNC) 2013
DOI: 10.1109/ccnc.2013.6488456
|View full text |Cite
|
Sign up to set email alerts
|

Towards practical privacy-preserving digital rights management for cloud computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2013
2013
2018
2018

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(9 citation statements)
references
References 14 publications
0
9
0
Order By: Relevance
“…The approach towards privacy-preserving DRM by Joshi et al [10] also requires a TTP for license checking before content execution. It makes use of a number of cryptographic primitives such as proxy re-encryption, ring signatures and an anonymous recipient scheme to provide unlinkability of content executions.…”
Section: Privacy-preserving Drmmentioning
confidence: 99%
See 3 more Smart Citations
“…The approach towards privacy-preserving DRM by Joshi et al [10] also requires a TTP for license checking before content execution. It makes use of a number of cryptographic primitives such as proxy re-encryption, ring signatures and an anonymous recipient scheme to provide unlinkability of content executions.…”
Section: Privacy-preserving Drmmentioning
confidence: 99%
“…The CP creates the license for content i. This license includes a license identifier id, a timestamp ts, the content-id i , the license terms, and the CP's certificate cert cp (10). Note that the license terms depend on the license model, i.e., for execute at most n-times-models, the terms include the maximum number of allowed executions n. For other license models, the terms will differ accordingly.…”
Section: Sc Cad Cpmentioning
confidence: 99%
See 2 more Smart Citations
“…On the definition of security for ring signature, Bendery et al (2006) gave a strongest definition of both anonymity and unforgeability depending on the security strength for ring signature. Due to the unique anonymity and flexibility (such as, no managers and no revocation procedure), ring signature plays an important role in cloud computing for solving privacy issue, which have been suggested in some works (Jensen et al, 2010;Xin et al, 2011;Joshi and Petrlic, 2013). In order to demonstrate how to use ring signature for the anonymous authentication in cloud, we consider a privacy-preserving digital right management (PP-DRM) system (Joshi and Petrlic, 2013).…”
Section: Introductionmentioning
confidence: 99%