Abstract
In the past years there has been an increasing interest in developing DRM (Digital Rights Management) systems. The purpose of DRM is to protect the copyrights of content providers and to enable only designated users to access digital contents. From the consumers’ point of view, they have a tendency to go against complex and confusing limitations. Consumers want to enjoy contents without hassle and with as few limitations as possible. The concept of Authorized Domain (AD) was presented to remove such problems. However, the previous work on authorized domain has two problems. The first is that it requires a rather expensive revocation mechanism. The second is that the devices still can play contents which are previously obtained even though they are currently out of the authorized domain. On the contrary, our scheme prevents the content from being played by devices which are out of the domain for better security. Furthermore our scheme does not need to maintain a revocation list and can prevent replay attack.
This work was supported by the University IT Research Center Project funded by the Korea Ministry of Information and Communication.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Ripley, M., Traw, C.B.S., Balogh, S., Reed, M.: Content Protection in the Digital Home. Intel Technology journal 49–56 (2002)
Eskicioglu, A.M., Delp, E.J.: An overview of multimedia content protection in consumer electronic devices. Signal Processing: Image Communication 681–699 (2001)
Eskicioglu, A.M., Town, J., Delp, E.J.: Security of Digital Entertainment Content from Creation to Consumption. Signal Processing: Image Communication 237–262 (2003)
Liu, Q., Safavi-Naini, R., Sheppard, N.P.: Digital rights management for content distribution. In: proceedings of the Australasian information security workshop conference on AISW frontiers, pp. 49–58 (2003)
Michiels, S., Verslype, K., Joosen, W., Decker, B.: Towards a Software Architecture for DRM. In: Proceedings of the Fifth ACM Workshop on Digital Rights Management, pp. 65–74 (2005)
van den Heuval, S., Jonker, W., Kamperman, F., Lenoir, P.: Secure Content Management in Authorized Domains. In: Proc. IBC, pp. 467–474 (2002)
Sovio, S., Asokan, N., Nyberg, K.: Defining Authorization Domains Using Cirtual Devices. In: SAINT Workshops, pp. 331–336 (2003)
Tuecke, S., Welch, V., Engert, D., Pearlman, L., Thompson, M.: Internet X.509 Public Key Infrastructure (PKI) Proxy Certificate Profile. RFC 3820 (2004)
Popescu, Bogdan, C., Kamperman, Frank, L.A.J., Crispo, Bruno, Tanenbaum, Andrew, S.: A DRM security architecture for home networks. In: Proceedings of the 4th ACM workshop on Digital rights management, pp. 1–10 (2004)
DVB: Call for proposals for content protection & copy management technologies. DVB CPT REV 1.2 (2001)
IBM Research Division Almadern Research Center: eXtensible Content Protection (2003)
THOMSON: Smartright technical white paper (2003), Available: http://www.smartright.org/images/SMR/content/SmartRight_tech_whitepaper_jan28.pdf
Fraunhofer Institute, Light Weight DRM (LWDRM), http://www.lwdrm.com
Wikipedia, http://en.wikipedia.org
Microsoft, http://www.Microsoft.com
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Choi, D., Lee, Y., Kang, H., Kim, S., Won, D. (2007). An Efficient and Secure Rights Sharing Method for DRM System Against Replay Attack. In: Xiao, B., Yang, L.T., Ma, J., Muller-Schloer, C., Hua, Y. (eds) Autonomic and Trusted Computing. ATC 2007. Lecture Notes in Computer Science, vol 4610. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73547-2_16
Download citation
DOI: https://doi.org/10.1007/978-3-540-73547-2_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-73546-5
Online ISBN: 978-3-540-73547-2
eBook Packages: Computer ScienceComputer Science (R0)