Skip to main content

A Secure Electronic Software Distribution (ESD) Protocol based on PKC

  • Conference paper
  • First Online:
Electronic Commerce and Web Technologies (EC-Web 2000)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1875))

Included in the following conference series:

  • 808 Accesses

Abstract

In this paper we propose a secure electronic software distribution and copyright protection protocol for electronic commerce based on public key cryptography (PKC). The proposed protocol considers post-installation security using an authentication agent and electronic license. It prevents software piracy and illegal copying. Even if software is copied illegally, a merchant can trace back to its original owner from the electronic license. The proposed protocol provides consumers, merchants, and producers in the electronic marketplace with confidence, security, and efficiency.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kalakota and Whinston, Frontiers of Electronic Commerce, Addison Wesley, 1996.

    Google Scholar 

  2. Anup K. Ghosh, E-commerce Security, Wiley, 1998.

    Google Scholar 

  3. Rafail Ostrovsky, “An Efficient Software Protection Scheme,” Advances in Cryptology-CRYPTO’ 89 Proceedings, Springer-Verlag, pp. 610–611, 1990.

    Google Scholar 

  4. Oded Goldreich, “Towards a Theory of Software Protection,” Advances in Cryptology-CRYPTO’ 86 Proceedings, Springer-Verlag, pp. 426–437, 1987.

    Google Scholar 

  5. W. Diffe and M. Hellman, “New Directions in Cryptography,” IEEE Transactions on Information Theory, November1976.

    Google Scholar 

  6. R.L. Rivest, A. Shamir and L. Adleman, “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems,” Comm. ACM, Vol. 21, No. 2, pp. 120–126, Feb. 1978.

    Article  MATH  MathSciNet  Google Scholar 

  7. Bruce Schneier, Applied Cryptography, Second Edition, Wiley, 1996.

    Google Scholar 

  8. Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone, Handbook of Applied Cryptography, CRC Press, 1997.

    Google Scholar 

  9. Software Piracy, URL: http://www.nopiracy.com.

  10. Symantec Software, URL: http://www.symantec.com

  11. S.O. Shop, URL: http://www.soshop.co.kr

  12. ESD, URL: http://www.spa.org/sigs/internetesdpoli.htm

  13. Sun Microsystems, “Servlet Tutorial,” URL: http://java.sun.com/products/jkd/1.2/docs/ext/servlet

  14. Phil Inje Chang, “Inside the java web server,” URL:http://java.sun.com/features/1997/aug/iwsl.html

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2000 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lee, SM., Lee, HW., Kim, TY. (2000). A Secure Electronic Software Distribution (ESD) Protocol based on PKC. In: Bauknecht, K., Madria, S.K., Pernul, G. (eds) Electronic Commerce and Web Technologies. EC-Web 2000. Lecture Notes in Computer Science, vol 1875. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44463-7_6

Download citation

  • DOI: https://doi.org/10.1007/3-540-44463-7_6

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-67981-3

  • Online ISBN: 978-3-540-44463-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics