{"title":"规则:用于数字版权管理的增强隐私的许可管理协议","authors":"Bok-Nyong Park, Jae-Won Kim, Wonjun Lee","doi":"10.1109/AINA.2004.1283971","DOIUrl":null,"url":null,"abstract":"One of the major issues raised by digital rights management (DRM) systems concerns the protection of the user's privacy and anonymous consumption of content. However, most existing DRM systems do not support the protection of each user's personal information. This paper suggests a privacy-enhancing license management protocol, named PrecePt (privacy-enhancing license management protocol), which is a more powerful protocol to protect personal information in DRM. To protect the exposure of user identifier, this protocol uses temporary ID and token to guarantee anonymity. The proposed scheme also uses a session key form ECDH cryptography and public-key so that it can protect the revelation of personal information and user privacy.","PeriodicalId":186142,"journal":{"name":"18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2004-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":"{\"title\":\"PrecePt: a privacy-enhancing license management protocol for digital rights management\",\"authors\":\"Bok-Nyong Park, Jae-Won Kim, Wonjun Lee\",\"doi\":\"10.1109/AINA.2004.1283971\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"One of the major issues raised by digital rights management (DRM) systems concerns the protection of the user's privacy and anonymous consumption of content. However, most existing DRM systems do not support the protection of each user's personal information. This paper suggests a privacy-enhancing license management protocol, named PrecePt (privacy-enhancing license management protocol), which is a more powerful protocol to protect personal information in DRM. To protect the exposure of user identifier, this protocol uses temporary ID and token to guarantee anonymity. The proposed scheme also uses a session key form ECDH cryptography and public-key so that it can protect the revelation of personal information and user privacy.\",\"PeriodicalId\":186142,\"journal\":{\"name\":\"18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.\",\"volume\":\"11 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2004-03-29\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"11\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/AINA.2004.1283971\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AINA.2004.1283971","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
PrecePt: a privacy-enhancing license management protocol for digital rights management
One of the major issues raised by digital rights management (DRM) systems concerns the protection of the user's privacy and anonymous consumption of content. However, most existing DRM systems do not support the protection of each user's personal information. This paper suggests a privacy-enhancing license management protocol, named PrecePt (privacy-enhancing license management protocol), which is a more powerful protocol to protect personal information in DRM. To protect the exposure of user identifier, this protocol uses temporary ID and token to guarantee anonymity. The proposed scheme also uses a session key form ECDH cryptography and public-key so that it can protect the revelation of personal information and user privacy.