A Secure Electronic Software Distribution (ESD) Protocol based on PKC
- 621 Downloads
In this paper we propose a secure electronic software distribution and copyright protection protocol for electronic commerce based on public key cryptography (PKC). The proposed protocol considers post-installation security using an authentication agent and electronic license. It prevents software piracy and illegal copying. Even if software is copied illegally, a merchant can trace back to its original owner from the electronic license. The proposed protocol provides consumers, merchants, and producers in the electronic marketplace with confidence, security, and efficiency.
Unable to display preview. Download preview PDF.
- 1.Kalakota and Whinston, Frontiers of Electronic Commerce, Addison Wesley, 1996.Google Scholar
- 2.Anup K. Ghosh, E-commerce Security, Wiley, 1998.Google Scholar
- 3.Rafail Ostrovsky, “An Efficient Software Protection Scheme,” Advances in Cryptology-CRYPTO’ 89 Proceedings, Springer-Verlag, pp. 610–611, 1990.Google Scholar
- 4.Oded Goldreich, “Towards a Theory of Software Protection,” Advances in Cryptology-CRYPTO’ 86 Proceedings, Springer-Verlag, pp. 426–437, 1987.Google Scholar
- 5.W. Diffe and M. Hellman, “New Directions in Cryptography,” IEEE Transactions on Information Theory, November1976.Google Scholar
- 7.Bruce Schneier, Applied Cryptography, Second Edition, Wiley, 1996.Google Scholar
- 8.Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone, Handbook of Applied Cryptography, CRC Press, 1997.Google Scholar
- 9.Software Piracy, URL: http://www.nopiracy.com.
- 10.Symantec Software, URL: http://www.symantec.com
- 11.S.O. Shop, URL: http://www.soshop.co.kr
- 13.Sun Microsystems, “Servlet Tutorial,” URL: http://java.sun.com/products/jkd/1.2/docs/ext/servlet
- 14.Phil Inje Chang, “Inside the java web server,” URL:http://java.sun.com/features/1997/aug/iwsl.html