Hiroshi Fujimoto, Takashi Suzuki, Takehiro Nakayama, Atushi Takeshita, Zulfikar Ramzan, Craig Gentry, Ravi Jain
{"title":"Content protection in adaptive content delivery","authors":"Hiroshi Fujimoto, Takashi Suzuki, Takehiro Nakayama, Atushi Takeshita, Zulfikar Ramzan, Craig Gentry, Ravi Jain","doi":"10.1002/ecja.20341","DOIUrl":null,"url":null,"abstract":"<p>This paper considers environment-adaptive content delivery in which an intermediary modifies the content between the content provider and the content user, and proposes a system in which the provider can securely control content modification by the intermediary in accordance with usage rules defined in the content. In order to have the intermediary follow the usage rules strictly, it is indispensable to provide a content protection technique in which tampering with content or usage rules by a third party is prevented while permitting content modification by intermediaries approved by the provider within the scope of the usage rules. The authors consider the hash-tree signature method in which data deletion by the intermediary is permitted, and propose a signature system with a place holder extension permitting data addition. A highly efficient realization of the proposed signature system based on the hash-sign-switch (HSS) method is presented. The effectiveness of the approach is shown by a quantitative evaluation using the implemented system. © 2007 Wiley Periodicals, Inc. Electron Comm Jpn Pt 1, 90(9): 54–66, 2007; Published online in Wiley InterScience (www.interscience.wiley.com). DOI 10.1002/ecja.20341</p>","PeriodicalId":100405,"journal":{"name":"Electronics and Communications in Japan (Part I: Communications)","volume":"90 9","pages":"54-66"},"PeriodicalIF":0.0000,"publicationDate":"2007-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1002/ecja.20341","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Electronics and Communications in Japan (Part I: Communications)","FirstCategoryId":"1085","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/ecja.20341","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
This paper considers environment-adaptive content delivery in which an intermediary modifies the content between the content provider and the content user, and proposes a system in which the provider can securely control content modification by the intermediary in accordance with usage rules defined in the content. In order to have the intermediary follow the usage rules strictly, it is indispensable to provide a content protection technique in which tampering with content or usage rules by a third party is prevented while permitting content modification by intermediaries approved by the provider within the scope of the usage rules. The authors consider the hash-tree signature method in which data deletion by the intermediary is permitted, and propose a signature system with a place holder extension permitting data addition. A highly efficient realization of the proposed signature system based on the hash-sign-switch (HSS) method is presented. The effectiveness of the approach is shown by a quantitative evaluation using the implemented system. © 2007 Wiley Periodicals, Inc. Electron Comm Jpn Pt 1, 90(9): 54–66, 2007; Published online in Wiley InterScience (www.interscience.wiley.com). DOI 10.1002/ecja.20341
自适应内容交付中的内容保护
本文考虑了由内容提供者和内容用户之间的中介修改内容的环境适应性内容交付,并提出了一个由内容提供者根据内容中定义的使用规则安全地控制中介修改内容的系统。为了使中介机构严格遵守使用规则,必须提供一种内容保护技术,既防止第三方篡改内容或使用规则,又允许提供商批准的中介机构在使用规则范围内修改内容。作者考虑了允许中间体删除数据的哈希树签名方法,并提出了一个允许添加数据的占位符扩展签名系统。提出了一种基于hash-sign-switch (HSS)方法的签名系统的高效实现。通过对所实施的系统进行定量评价,证明了该方法的有效性。©2007 Wiley期刊公司电子工程学报,2009,29 (3):444 - 444;在线发表于Wiley InterScience (www.interscience.wiley.com)。DOI 10.1002 / ecja.20341
本文章由计算机程序翻译,如有差异,请以英文原文为准。