An Enterprise Digital Right Management Scheme with Anonymous Trust for Mobile Devices

In recent years, various enterprise digital right management (E-DRM) schemes have been proposed to protect and manage access rights of digital contents for the enterprise applications. However, we find that the previous E-DRM schemes do not protect the user privacy while mobile users access digital contents. In addition, the previous E-DRM schemes have high computation and communication loads. Besides, these schemes do not provide usage tracking for the digital content, and thus the digital right may be abused by malicious users. To solve the above problems, we propose a new E-DRM scheme with anonymous trust for mobile devices in this paper. The proposed scheme has low computation and communication loads, and it provides the user anonymity and usage tracking. Therefore, the proposed scheme is more efficient and practical than the related works for E-DRM applications.

[1]  Taekyoung Kwon,et al.  Efficient Key Exchange and Authentication Protocols Protecting Weak Secrets , 1998 .

[2]  Taher El Gamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.

[3]  Li Zhao,et al.  License management scheme with anonymous trust for digital rights management , 2005, 2005 IEEE International Conference on Multimedia and Expo.

[4]  Reihaneh Safavi-Naini,et al.  Digital Rights Management for Content Distribution , 2003, ACSW.

[5]  Kazuhiro Yokoyama,et al.  Elliptic curve cryptosystem , 2000 .

[6]  Hung-Min Sun,et al.  Password-based authentication and key distribution protocols with perfect forward secrecy , 2006, J. Comput. Syst. Sci..

[7]  Chia-Chen Lin,et al.  Enterprise-Oriented Digital Rights Management Mechanism: eDRM , 2009, 2009 International Conference on Availability, Reliability and Security.

[8]  Chia-Chen Lin,et al.  A Mobile Trading Scheme for Digital Content Based on Digital Rights , 2008, 2008 Eighth International Conference on Intelligent Systems Design and Applications.

[9]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[10]  Emmanuel Bresson,et al.  Mutual authentication and group key agreement for low-power mobile devices , 2003, Comput. Commun..

[11]  Bruce Schneier,et al.  Applied cryptography : protocols, algorithms, and source codein C , 1996 .

[12]  Matu-Tarow Noda,et al.  Simple and Secure Password Authentication Protocol (SAS) , 2000 .

[13]  Alfred Menezes,et al.  Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.

[14]  Chin-Chen Chang,et al.  An efficient and reliable E-DRM scheme for mobile environments , 2010, Expert Syst. Appl..

[15]  Hung-Yu Chien,et al.  Robust and Simple Authentication Protocol , 2003, Comput. J..

[16]  Chin-Ling Chen,et al.  A secure and traceable E-DRM system based on mobile device , 2008, Expert Syst. Appl..

[17]  Taekyoung Kwon,et al.  Authenticated key exchange protocols resistant to password guessing attacks , 1998 .