Multimedia rights management for the multiple devices of end-user

This paper describes multimedia rights management enforcement for the multiple devices of end-user. Today, contents sharing and superdistribution of the multiple devices has become easy due to advancement in computer technology. However, most DRM vendors require only DRM client system of their own then end-user must have installed various clients and may worry about limited computing capacity. And the DRM vendors may worry that end-users could give or lend the multimedia rights of protected contents to device of another user what the DRM vendors don't allow. To resolve these problems, we propose a multimedia rights management scheme in which multiple devices of end-user are managed by only proxy manager controlled with interoperable client of each device. This scheme supports rights governance by public key based group communication that ensures that only legitimate operations can apply to the multimedia content.

[1]  Dalit Naor,et al.  Broadcast Encryption , 1993, Encyclopedia of Multimedia.

[2]  K. J. Ray Liu,et al.  Key distribution for secure multimedia multicasts via data embedding , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).

[3]  Tsutomu Matsumoto,et al.  A Quick Group Key Distribution Scheme with "Entity Revocation" , 1999, ASIACRYPT.

[4]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[5]  Silvio Micali,et al.  How to construct random functions , 1986, JACM.

[6]  Eric J. Harder,et al.  Key Management for Multicast: Issues and Architectures , 1999, RFC.

[7]  Alan T. Sherman,et al.  Key Establishment in Large Dynamic Groups Using One-Way Function Trees , 2003, IEEE Trans. Software Eng..

[8]  Jessica Staddon,et al.  Combinatorial Bounds for Broadcast Encryption , 1998, EUROCRYPT.

[9]  Moni Naor,et al.  Multicast security: a taxonomy and some efficient constructions , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).

[10]  Benny Pinkas Efficient State Updates for Key Management , 2001, Digital Rights Management Workshop.

[11]  Moni Naor,et al.  Revocation and Tracing Schemes for Stateless Receivers , 2001, CRYPTO.

[12]  Michael Luby,et al.  Pseudorandomness and cryptographic applications , 1996, Princeton computer science notes.