Skip to main content

An Efficient and Secure Rights Sharing Method for DRM System Against Replay Attack

  • Conference paper
Autonomic and Trusted Computing (ATC 2007)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 4610))

Included in the following conference series:

  • 842 Accesses

Abstract

In the past years there has been an increasing interest in developing DRM (Digital Rights Management) systems. The purpose of DRM is to protect the copyrights of content providers and to enable only designated users to access digital contents. From the consumers’ point of view, they have a tendency to go against complex and confusing limitations. Consumers want to enjoy contents without hassle and with as few limitations as possible. The concept of Authorized Domain (AD) was presented to remove such problems. However, the previous work on authorized domain has two problems. The first is that it requires a rather expensive revocation mechanism. The second is that the devices still can play contents which are previously obtained even though they are currently out of the authorized domain. On the contrary, our scheme prevents the content from being played by devices which are out of the domain for better security. Furthermore our scheme does not need to maintain a revocation list and can prevent replay attack.

This work was supported by the University IT Research Center Project funded by the Korea Ministry of Information and Communication.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ripley, M., Traw, C.B.S., Balogh, S., Reed, M.: Content Protection in the Digital Home. Intel Technology journal 49–56 (2002)

    Google Scholar 

  2. Eskicioglu, A.M., Delp, E.J.: An overview of multimedia content protection in consumer electronic devices. Signal Processing: Image Communication 681–699 (2001)

    Google Scholar 

  3. Eskicioglu, A.M., Town, J., Delp, E.J.: Security of Digital Entertainment Content from Creation to Consumption. Signal Processing: Image Communication 237–262 (2003)

    Google Scholar 

  4. Liu, Q., Safavi-Naini, R., Sheppard, N.P.: Digital rights management for content distribution. In: proceedings of the Australasian information security workshop conference on AISW frontiers, pp. 49–58 (2003)

    Google Scholar 

  5. Michiels, S., Verslype, K., Joosen, W., Decker, B.: Towards a Software Architecture for DRM. In: Proceedings of the Fifth ACM Workshop on Digital Rights Management, pp. 65–74 (2005)

    Google Scholar 

  6. van den Heuval, S., Jonker, W., Kamperman, F., Lenoir, P.: Secure Content Management in Authorized Domains. In: Proc. IBC, pp. 467–474 (2002)

    Google Scholar 

  7. Sovio, S., Asokan, N., Nyberg, K.: Defining Authorization Domains Using Cirtual Devices. In: SAINT Workshops, pp. 331–336 (2003)

    Google Scholar 

  8. Tuecke, S., Welch, V., Engert, D., Pearlman, L., Thompson, M.: Internet X.509 Public Key Infrastructure (PKI) Proxy Certificate Profile. RFC 3820 (2004)

    Google Scholar 

  9. Popescu, Bogdan, C., Kamperman, Frank, L.A.J., Crispo, Bruno, Tanenbaum, Andrew, S.: A DRM security architecture for home networks. In: Proceedings of the 4th ACM workshop on Digital rights management, pp. 1–10 (2004)

    Google Scholar 

  10. DVB: Call for proposals for content protection & copy management technologies. DVB CPT REV 1.2 (2001)

    Google Scholar 

  11. IBM Research Division Almadern Research Center: eXtensible Content Protection (2003)

    Google Scholar 

  12. THOMSON: Smartright technical white paper (2003), Available: http://www.smartright.org/images/SMR/content/SmartRight_tech_whitepaper_jan28.pdf

  13. Fraunhofer Institute, Light Weight DRM (LWDRM), http://www.lwdrm.com

  14. Wikipedia, http://en.wikipedia.org

  15. Microsoft, http://www.Microsoft.com

Download references

Author information

Authors and Affiliations

Authors

Editor information

Bin Xiao Laurence T. Yang Jianhua Ma Christian Muller-Schloer Yu Hua

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Choi, D., Lee, Y., Kang, H., Kim, S., Won, D. (2007). An Efficient and Secure Rights Sharing Method for DRM System Against Replay Attack. In: Xiao, B., Yang, L.T., Ma, J., Muller-Schloer, C., Hua, Y. (eds) Autonomic and Trusted Computing. ATC 2007. Lecture Notes in Computer Science, vol 4610. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73547-2_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-73547-2_16

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-73546-5

  • Online ISBN: 978-3-540-73547-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics