Volume 8 Number 6 (Jun. 2013)
Home > Archive > 2013 > Volume 8 Number 6 (Jun. 2013) >
JSW 2013 Vol.8(6): 1526-1535 ISSN: 1796-217X
doi: 10.4304/jsw.8.6.1526-1535

Verifiable Threshold Authorization for Scalable and Secure Digital Rights Management

Zhaofeng Ma1, 2, Jianqing Huang3, Yixian Yang1, Xinxin Niu1

1Department of Computer Science and Technology, Beijing University of Posts and Telecommunications, 100876, Beijing, China
2Beijing National Security Science and Technology Co., Ltd, 100876, Beijing, China
3Library of Beijing University of Posts and Telecommunications, 100876, Beijing, China

Abstract—With fast development of network computing and storage technologies, it became more and more convenient to share and spread digital resources through kinds of network services, however without protection and constraint of copyright, digital content can be illegally copied, altered and distributed, which could cause revenue loss to commercial digital resource providers, to solve this problem, digital rights management(DRM) is adopted to control copyrights of digital resources in a reasonable degree. Most of current DRM systems were built up in centered authorization mode which can work efficiently in normal case, but once the DRM administrator is unauthentic or the server collapsed, it will not provide authentication and authorization service again. In this paper, a verifiable threshold authorization scheme (VETAS) based on ellipse curve cryptosystem (ECC) and Lagrange polynomial is adopted for scalable and robust digital rights management, in which authorization was based on t-out of n qualified members, less than t members cannot implement authorization, and the system can still work well once part of the members are unauthentic. The advantage of the VETAS scheme is that it works in a “mutual authentication and threshold authorization” mode, thus end-user and the authorization center can authenticate each other to enhance security of corresponding identity, another advantage of the VETAS scheme is it can provide real-time rights management with fairly good robustness and reliability in a threshold authorization mode.

Index Terms—Verifiable Threshold Authorization, Mutual Authentication, Digital Rights Management (DRM).

[PDF]

Cite: Zhaofeng Ma, Jianqing Huang, Yixian Yang, Xinxin Niu, "Verifiable Threshold Authorization for Scalable and Secure Digital Rights Management," Journal of Software vol. 8, no. 6, pp. 1526-1535, 2013.

General Information

  • ISSN: 1796-217X (Online)

  • Abbreviated Title: J. Softw.

  • Frequency:  Quarterly

  • APC: 500USD

  • DOI: 10.17706/JSW

  • Editor-in-Chief: Prof. Antanas Verikas

  • Executive Editor: Ms. Cecilia Xie

  • Abstracting/ Indexing: DBLP, EBSCO,
           CNKIGoogle Scholar, ProQuest,
           INSPEC(IET), ULRICH's Periodicals
           Directory, WorldCat, etc

  • E-mail: jsweditorialoffice@gmail.com

  • Oct 22, 2024 News!

    Vol 19, No 3 has been published with online version   [Click]

  • Jan 04, 2024 News!

    JSW will adopt Article-by-Article Work Flow

  • Apr 01, 2024 News!

    Vol 14, No 4- Vol 14, No 12 has been indexed by IET-(Inspec)     [Click]

  • Apr 01, 2024 News!

    Papers published in JSW Vol 18, No 1- Vol 18, No 6 have been indexed by DBLP   [Click]

  • Jun 12, 2024 News!

    Vol 19, No 2 has been published with online version   [Click]