Volume 8 Number 6 (Jun. 2013)
Home > Archive > 2013 > Volume 8 Number 6 (Jun. 2013) >
JSW 2013 Vol.8(6): 1526-1535 ISSN: 1796-217X
doi: 10.4304/jsw.8.6.1526-1535

Verifiable Threshold Authorization for Scalable and Secure Digital Rights Management

Zhaofeng Ma1, 2, Jianqing Huang3, Yixian Yang1, Xinxin Niu1
1Department of Computer Science and Technology, Beijing University of Posts and Telecommunications, 100876, Beijing, China
2Beijing National Security Science and Technology Co., Ltd, 100876, Beijing, China
3Library of Beijing University of Posts and Telecommunications, 100876, Beijing, China

Abstract—With fast development of network computing and storage technologies, it became more and more convenient to share and spread digital resources through kinds of network services, however without protection and constraint of copyright, digital content can be illegally copied, altered and distributed, which could cause revenue loss to commercial digital resource providers, to solve this problem, digital rights management(DRM) is adopted to control copyrights of digital resources in a reasonable degree. Most of current DRM systems were built up in centered authorization mode which can work efficiently in normal case, but once the DRM administrator is unauthentic or the server collapsed, it will not provide authentication and authorization service again. In this paper, a verifiable threshold authorization scheme (VETAS) based on ellipse curve cryptosystem (ECC) and Lagrange polynomial is adopted for scalable and robust digital rights management, in which authorization was based on t-out of n qualified members, less than t members cannot implement authorization, and the system can still work well once part of the members are unauthentic. The advantage of the VETAS scheme is that it works in a “mutual authentication and threshold authorization” mode, thus end-user and the authorization center can authenticate each other to enhance security of corresponding identity, another advantage of the VETAS scheme is it can provide real-time rights management with fairly good robustness and reliability in a threshold authorization mode.

Index Terms—Verifiable Threshold Authorization, Mutual Authentication, Digital Rights Management (DRM).

[PDF]

Cite: Zhaofeng Ma, Jianqing Huang, Yixian Yang, Xinxin Niu, "Verifiable Threshold Authorization for Scalable and Secure Digital Rights Management," Journal of Software vol. 8, no. 6, pp. 1526-1535, 2013.

General Information

ISSN: 1796-217X (Online)
Frequency:  Bimonthly (Since 2020)
Editor-in-Chief: Prof. Antanas Verikas
Executive Editor: Ms. Yoyo Y. Zhou
Abstracting/ Indexing: DBLP, EBSCO, Google Scholar, ProQuest, INSPEC(IET), ULRICH's Periodicals Directory, WorldCat, etc
E-mail: jsw@iap.org
  • Apr 26, 2021 News!

    Vol 14, No 4- Vol 14, No 12 has been indexed by IET-(Inspec)     [Click]

  • Jun 22, 2020 News!

    Papers published in JSW Vol 14, No 1- Vol 15 No 4 have been indexed by DBLP     [Click]

  • Sep 13, 2021 News!

    The papers published in Vol 16, No 6 have all received dois from Crossref    [Click]

  • Jan 28, 2021 News!

    [CFP] 2021 the annual meeting of JSW Editorial Board, ICCSM 2021, will be held in Rome, Italy, July 21-23, 2021   [Click]

  • Sep 13, 2021 News!

    Vol 16, No 6 has been published with online version     [Click]