메뉴 건너뛰기




Volumn E87-A, Issue 1, 2004, Pages 160-172

Managing Encryption and Key Publication Independently in Digital Rights Management Systems

Author keywords

Adaptive attacks; Copyright protection; Digital rights management systems; Semantic security

Indexed keywords

COMPUTATIONAL METHODS; DATABASE SYSTEMS; DECISION MAKING; DIGITAL WATERMARKING; PARAMETER ESTIMATION; PROBLEM SOLVING; RANDOM PROCESSES; SECURITY OF DATA; SEMANTICS; SERVERS;

EID: 0842310306     PISSN: 09168508     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Conference Paper
Times cited : (6)

References (22)
  • 2
    • 84957629783 scopus 로고    scopus 로고
    • Relations among notions of security for public-key encryption schemes
    • Advances in Cryptology-CRYPTO'98, Springer-Verlag
    • M. Bellare, A. Desai, D. Pointcheval, and P. Rogaway, "Relations among notions of security for public-key encryption schemes," Advances in Cryptology-CRYPTO'98, LNCS 1462, pp.26-45, Springer-Verlag, 1998.
    • (1998) LNCS , vol.1462 , pp. 26-45
    • Bellare, M.1    Desai, A.2    Pointcheval, D.3    Rogaway, P.4
  • 3
    • 84947778144 scopus 로고    scopus 로고
    • The decision Diffie-Hellman problem
    • Proc. ANTS III, Springer-Verlag
    • D. Boneh, "The decision Diffie-Hellman problem," Proc. ANTS III, LNCS 1423, pp.48-63, Springer-Verlag, 1998.
    • (1998) LNCS , vol.1423 , pp. 48-63
    • Boneh, D.1
  • 4
    • 84957085257 scopus 로고    scopus 로고
    • An efficient public key traitor tracing scheme
    • Advances in Cryptology-CRYPTO'99, Springer-Verlag
    • D. Boneh and M. Franklin, "An efficient public key traitor tracing scheme," Advances in Cryptology-CRYPTO'99, LNCS 1592, pp.338-353, Springer-Verlag, 1999.
    • (1999) LNCS , vol.1592 , pp. 338-353
    • Boneh, D.1    Franklin, M.2
  • 5
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • Advances in Cryptology-CRYPTO 2001, Springer-Verlag
    • D. Boneh and M. Franklin, "Identity-based encryption from the Weil pairing," Advances in Cryptology-CRYPTO 2001, LNCS 2139, pp.213-229, Springer-Verlag, 2001.
    • (2001) LNCS , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 6
    • 0037623983 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • Full version of [5]
    • D. Boneh and M. Franklin, "Identity-based encryption from the Weil pairing." SIAM J. Comput., vol.32, no.3, pp.586-615, 2003. Full version of [5].
    • (2003) SIAM J. Comput. , vol.32 , Issue.3 , pp. 586-615
    • Boneh, D.1    Franklin, M.2
  • 7
    • 84985922619 scopus 로고
    • Tracing traitors
    • Advances in Cryptology-CRYPTO'94, Springer-Verlag
    • B. Chor, A. Fiat, and M. Naor, "Tracing traitors," Advances in Cryptology-CRYPTO'94, LNCS 839, pp.257-270, Springer-Verlag, 1994.
    • (1994) LNCS , vol.839 , pp. 257-270
    • Chor, B.1    Fiat, A.2    Naor, M.3
  • 8
    • 84870707379 scopus 로고    scopus 로고
    • A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
    • Advances in Cryptology-CRYPTO'98, Springer-Verlag
    • R. Cramer and V. Shoup, "A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack," Advances in Cryptology-CRYPTO'98, LNCS 1462, pp. 13-25, Springer-Verlag, 1998.
    • (1998) LNCS , vol.1462 , pp. 13-25
    • Cramer, R.1    Shoup, V.2
  • 9
    • 84958957924 scopus 로고    scopus 로고
    • RIPEMD160: Strengthened version of RIPEMD
    • Proc. FSE'96, Springer-Verlag
    • H. Dobbertin, A. Bosselaers, and B. Preneel, "RIPEMD160: Strengthened version of RIPEMD," Proc. FSE'96, LNCS 1039, pp.71-82, Springer-Verlag, 1996.
    • (1996) LNCS , vol.1039 , pp. 71-82
    • Dobbertin, H.1    Bosselaers, A.2    Preneel, B.3
  • 10
    • 84947254092 scopus 로고    scopus 로고
    • Key-insulated public key cryptosystems
    • Advances in Cryptology-EUROCRYPT 2002, Springer-Verlag
    • Y. Dodis, J. Katz, S. Xu, and M. Yung, "Key-insulated public key cryptosystems." Advances in Cryptology-EUROCRYPT 2002, LNCS 2332, pp.65-82, Springer-Verlag, 2002.
    • (2002) LNCS , vol.2332 , pp. 65-82
    • Dodis, Y.1    Katz, J.2    Xu, S.3    Yung, M.4
  • 11
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • T. ElGamal, "A public key cryptosystem and a signature scheme based on discrete logarithms." IEEE Trans. Inf. Theory. vol.IT-31, no.4, pp.469-472, 1985.
    • (1985) IEEE Trans. Inf. Theory. , vol.IT-31 , Issue.4 , pp. 469-472
    • Elgamal, T.1
  • 12
    • 70349557354 scopus 로고    scopus 로고
    • Hierarchical ID-based cryptography
    • Advances in Cryptology-ASIACRYPT 2002, Springer-Verlag
    • C. Gentry and A. Silverberg, "Hierarchical ID-based cryptography," Advances in Cryptology-ASIACRYPT 2002, LNCS 2501, pp.548-566, Springer-Verlag, 2002.
    • (2002) LNCS , vol.2501 , pp. 548-566
    • Gentry, C.1    Silverberg, A.2
  • 13
    • 84947242701 scopus 로고    scopus 로고
    • Toward hierarchical identity-based encryption
    • Advances in Cryptology-EUROCRYPT 2002, Springer-Verlag
    • J. Horwitz and B. Lynn, "Toward hierarchical identity-based encryption," Advances in Cryptology-EUROCRYPT 2002, LNCS 2332, pp.466-481, Springer-Verlag, 2002.
    • (2002) LNCS , vol.2332 , pp. 466-481
    • Horwitz, J.1    Lynn, B.2
  • 14
    • 0842327109 scopus 로고    scopus 로고
    • Separating encryption and key issuance in digital rights management systems
    • Proc. ACISP'03, Springer-Verlag
    • G. Hanaoka, K. Ogawa, I. Murota, G. Ohtake, K. Majima, S. Gohshi, K. Oyamada, S. Namba, and H. Imai, "Separating encryption and key issuance in digital rights management systems," Proc. ACISP'03, LNCS 2727, pp.365-376, Springer-Verlag, 2003.
    • (2003) LNCS , vol.2727 , pp. 365-376
    • Hanaoka, G.1    Ogawa, K.2    Murota, I.3    Ohtake, G.4    Majima, K.5    Gohshi, S.6    Oyamada, K.7    Namba, S.8    Imai, H.9
  • 15
    • 85027183613 scopus 로고    scopus 로고
    • http://www.intertrust.com/
  • 16
    • 35248866858 scopus 로고    scopus 로고
    • Optimum traitor tracing and asymmetric schemes
    • Advances in Cryptology-EUROCRYPT'98, Springer-Verlag
    • K. Kurosawa and Y. Desmedt, "Optimum traitor tracing and asymmetric schemes," Advances in Cryptology-EUROCRYPT'98, LNCS 1403, pp.145-157, Springer-Verlag, 1998.
    • (1998) LNCS , vol.1403 , pp. 145-157
    • Kurosawa, K.1    Desmedt, Y.2
  • 17
    • 85027110814 scopus 로고    scopus 로고
    • http://www.microsoft.com/windows/windowsmedia/drm.asp
  • 18
    • 84974554584 scopus 로고
    • Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack
    • Advances in Cryptology-CRYPTO'91, Springer-Verlag
    • C. Rackoff and D.R. Simon, "Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack." Advances in Cryptology-CRYPTO'91. LNCS 576, pp.433-444, Springer-Verlag, 1992.
    • (1992) LNCS , vol.576 , pp. 433-444
    • Rackoff, C.1    Simon, D.R.2
  • 19
    • 0003629991 scopus 로고
    • FIPS PUB 180-1, Department of Commerce, Washington D.C
    • NIST, "Secure hash standard," FIPS PUB 180-1, Department of Commerce, Washington D.C., 1995.
    • (1995) Secure Hash Standard
  • 20
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • Advances in Cryptology-CKYPTO'84, Springer-Verlag
    • A. Shamir, "Identity-based cryptosystems and signature schemes," Advances in Cryptology-CKYPTO'84, LNCS 196, pp.47-53, Springer-Verlag, 1985.
    • (1985) LNCS , vol.196 , pp. 47-53
    • Shamir, A.1
  • 21
    • 85027106347 scopus 로고    scopus 로고
    • http://www.xrml.com/
  • 22
    • 84985796228 scopus 로고
    • HAVAL - A one-way hashing algorithm with variable length of output
    • Proc. Auscrypt'92, Springer-Verlag
    • Y. Zheng, J. Pieprzyk, and J. Seberry, "HAVAL - A one-way hashing algorithm with variable length of output," Proc. Auscrypt'92, LNCS 718, pp.83-104, Springer-Verlag, 1993.
    • (1993) LNCS , vol.718 , pp. 83-104
    • Zheng, Y.1    Pieprzyk, J.2    Seberry, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.