Key Management Scheme Using Secret Sharing for Multi-Device based DRM

被引:0
|
作者
Kim, Junghoon [1 ]
Lee, Hoonjung [1 ]
Son, Junggab [1 ]
Rhim, Wonwoo [1 ]
Kim, Sangjin [2 ]
Oh, Heekuck [1 ]
机构
[1] Hanyang Univ, Dept Comp Sci & Engn, Seoul, South Korea
[2] Korea Univ Technol & Educ, Dept Comp Sci & Engn, Cheonan, South Korea
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we propose a key management scheme in DRM which supports multi devices by using a secret sharing. The proposed scheme enables playing contents on registered devices only, and additional overheads are not occurring even if the number of registered devices are increased. We measured the overheads occurred by the proposed scheme through a prototype implementation, and showed that the scheme is applicable to consumer devices.
引用
收藏
页码:384 / +
页数:2
相关论文
共 50 条
  • [31] Yet another insecure group key distribution scheme using secret sharing
    Mitchell, Chris J.
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 57
  • [32] A VERIFIABLE MULTI-SECRET SHARING SCHEME
    Wang, Yong
    Zhu, Yanqin
    Luo, Xizhao
    INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE & TECHNOLOGY, PROCEEDINGS, 2009, : 136 - 138
  • [33] A threshold multi-secret sharing scheme
    Shi Runhua
    Huang Liusheng
    Luo yonglong
    Zhong Hong
    PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL, VOLS 1 AND 2, 2008, : 1705 - +
  • [34] A scheme for threshold multi-secret sharing
    Chan, CW
    Chang, CC
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 166 (01) : 1 - 14
  • [35] Key Management in Multi-Distributor based DRM System with Mobile Clients using IBE
    Dutta, Ratna
    Mukhopadhyay, Sourav
    Dowling, Tom
    2009 SECOND INTERNATIONAL CONFERENCE ON THE APPLICATIONS OF DIGITAL INFORMATION AND WEB TECHNOLOGIES (ICADIWT 2009), 2009, : 597 - +
  • [36] A Novel Multi Secret Sharing Scheme with MSB Extraction Using EVCS
    Aarti
    Rajput, Pushpendra K.
    2013 SIXTH INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING (IC3), 2013, : 169 - 174
  • [37] Efficient Multi-secret Sharing Scheme Using Room Square
    Li, Ming-Jheng
    Chang, Ying-Hsuan
    Juan, Justie Su-Tzu
    2009 THIRD IEEE INTERNATIONAL CONFERENCE ON SECURE SOFTWARE INTEGRATION AND RELIABILITY IMPROVEMENT, PROCEEDINGS, 2009, : 260 - 266
  • [38] An elliptic curve secret sharing key management scheme for mobile ad hoc networks
    Dahshan, Hisham
    Irvine, James
    SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (12) : 1405 - 1419
  • [39] Recoverable Private Key Scheme for Consortium Blockchain Based on Verifiable Secret Sharing
    Li, Guojia
    You, Lin
    Hu, Gengran
    Hu, Liqin
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2021, 15 (08): : 2865 - 2878
  • [40] JuxtaPinch: Exploring Multi-Device Interaction in Collocated Photo Sharing
    Nielsen, Heidi Selmer
    Olsen, Marius Pallisgaard
    Skov, Mikael B.
    Kjeldskov, Jesper
    PROCEEDINGS OF THE 16TH ACM INTERNATIONAL CONFERENCE ON HUMAN-COMPUTER INTERACTION WITH MOBILE DEVICES AND SERVICES (MOBILEHCI'14), 2014, : 183 - 192