{"title":"用于安全电子内容分发和许可的基于身份的协议","authors":"N. Oikonomidis, C. Ruland","doi":"10.1109/WDM.2004.1358105","DOIUrl":null,"url":null,"abstract":"Contemporary systems for distribution of electronic media content and its respective licenses are limited in a way that neither the consumers nor the vendors can operate in a reliable and flexible way. Further, the security architecture that comprises these systems is based and literally mapped upon them from security architectures, which apply to distributed systems based on computer terminals and not necessarily on mobile devices. The attempt to apply such architectures on the world of mobile multimedia so far has lead to solutions, which mostly rely on one single certification authority. It is more than obvious that this fact introduces the fatal risk of having a single-point-of-attack, since a compromise of the CA's private key leads to a compromise of the entire system. Our proposal introduces protocols that utilize ID-based cryptographic methods, in order to provide electronic content delivery and licensing.","PeriodicalId":310813,"journal":{"name":"Proceedings of the Fourth International Conference onWeb Delivering of Music, 2004. EDELMUSIC 2004.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2004-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Identity based protocols for secure electronic content distribution and licensing\",\"authors\":\"N. Oikonomidis, C. Ruland\",\"doi\":\"10.1109/WDM.2004.1358105\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Contemporary systems for distribution of electronic media content and its respective licenses are limited in a way that neither the consumers nor the vendors can operate in a reliable and flexible way. Further, the security architecture that comprises these systems is based and literally mapped upon them from security architectures, which apply to distributed systems based on computer terminals and not necessarily on mobile devices. The attempt to apply such architectures on the world of mobile multimedia so far has lead to solutions, which mostly rely on one single certification authority. It is more than obvious that this fact introduces the fatal risk of having a single-point-of-attack, since a compromise of the CA's private key leads to a compromise of the entire system. Our proposal introduces protocols that utilize ID-based cryptographic methods, in order to provide electronic content delivery and licensing.\",\"PeriodicalId\":310813,\"journal\":{\"name\":\"Proceedings of the Fourth International Conference onWeb Delivering of Music, 2004. EDELMUSIC 2004.\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2004-09-13\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the Fourth International Conference onWeb Delivering of Music, 2004. EDELMUSIC 2004.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/WDM.2004.1358105\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the Fourth International Conference onWeb Delivering of Music, 2004. EDELMUSIC 2004.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WDM.2004.1358105","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Identity based protocols for secure electronic content distribution and licensing
Contemporary systems for distribution of electronic media content and its respective licenses are limited in a way that neither the consumers nor the vendors can operate in a reliable and flexible way. Further, the security architecture that comprises these systems is based and literally mapped upon them from security architectures, which apply to distributed systems based on computer terminals and not necessarily on mobile devices. The attempt to apply such architectures on the world of mobile multimedia so far has lead to solutions, which mostly rely on one single certification authority. It is more than obvious that this fact introduces the fatal risk of having a single-point-of-attack, since a compromise of the CA's private key leads to a compromise of the entire system. Our proposal introduces protocols that utilize ID-based cryptographic methods, in order to provide electronic content delivery and licensing.