Advertisement

A Secure Electronic Software Distribution (ESD) Protocol based on PKC

  • Sung-Min Lee
  • Hyung-Woo Lee
  • Tai-Yun Kim
Conference paper
  • 621 Downloads
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1875)

Abstract

In this paper we propose a secure electronic software distribution and copyright protection protocol for electronic commerce based on public key cryptography (PKC). The proposed protocol considers post-installation security using an authentication agent and electronic license. It prevents software piracy and illegal copying. Even if software is copied illegally, a merchant can trace back to its original owner from the electronic license. The proposed protocol provides consumers, merchants, and producers in the electronic marketplace with confidence, security, and efficiency.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Kalakota and Whinston, Frontiers of Electronic Commerce, Addison Wesley, 1996.Google Scholar
  2. 2.
    Anup K. Ghosh, E-commerce Security, Wiley, 1998.Google Scholar
  3. 3.
    Rafail Ostrovsky, “An Efficient Software Protection Scheme,” Advances in Cryptology-CRYPTO’ 89 Proceedings, Springer-Verlag, pp. 610–611, 1990.Google Scholar
  4. 4.
    Oded Goldreich, “Towards a Theory of Software Protection,” Advances in Cryptology-CRYPTO’ 86 Proceedings, Springer-Verlag, pp. 426–437, 1987.Google Scholar
  5. 5.
    W. Diffe and M. Hellman, “New Directions in Cryptography,” IEEE Transactions on Information Theory, November1976.Google Scholar
  6. 6.
    R.L. Rivest, A. Shamir and L. Adleman, “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems,” Comm. ACM, Vol. 21, No. 2, pp. 120–126, Feb. 1978.zbMATHCrossRefMathSciNetGoogle Scholar
  7. 7.
    Bruce Schneier, Applied Cryptography, Second Edition, Wiley, 1996.Google Scholar
  8. 8.
    Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone, Handbook of Applied Cryptography, CRC Press, 1997.Google Scholar
  9. 9.
    Software Piracy, URL: http://www.nopiracy.com.
  10. 10.
    Symantec Software, URL: http://www.symantec.com
  11. 11.
    S.O. Shop, URL: http://www.soshop.co.kr
  12. 12.
  13. 13.
    Sun Microsystems, “Servlet Tutorial,” URL: http://java.sun.com/products/jkd/1.2/docs/ext/servlet
  14. 14.
    Phil Inje Chang, “Inside the java web server,” URL:http://java.sun.com/features/1997/aug/iwsl.html

Copyright information

© Springer-Verlag Berlin Heidelberg 2000

Authors and Affiliations

  • Sung-Min Lee
    • 1
  • Hyung-Woo Lee
    • 2
  • Tai-Yun Kim
    • 1
  1. 1.Department of Computer Science & EngineeringKorea UniversitySeoulKorea
  2. 2.Division of Information & Communication EngineeringChonan UniversityChungnamKorea

Personalised recommendations