{"title":"转售数码内容","authors":"L. Aimani, Yona Raekow","doi":"10.1109/ARES.2010.18","DOIUrl":null,"url":null,"abstract":"Digital content, protected by specific terms of use, is currently delivered to customers via a few selected content providers. Allowing arbitrary entities,not just trusted content providers, to resell legitimately purchased,protected digital content to another entity, adds additional challenges to a DRM environment. In this paper, we formally model the problem of reselling digital content, and we provide a secure construction based on one-time(proxy) signatures. Our construction allows an arbitrary seller to resell its digital content to any buyer. We ensure that the identity of the buyer is only known to the seller. The buyer can verify that the purchased content is genuine. After the transaction is completed only the legitimate current owner can use the digital content. Any illegal use can be identified by a trusted authority.","PeriodicalId":360339,"journal":{"name":"2010 International Conference on Availability, Reliability and Security","volume":"2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"Reselling Digital Content\",\"authors\":\"L. Aimani, Yona Raekow\",\"doi\":\"10.1109/ARES.2010.18\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Digital content, protected by specific terms of use, is currently delivered to customers via a few selected content providers. Allowing arbitrary entities,not just trusted content providers, to resell legitimately purchased,protected digital content to another entity, adds additional challenges to a DRM environment. In this paper, we formally model the problem of reselling digital content, and we provide a secure construction based on one-time(proxy) signatures. Our construction allows an arbitrary seller to resell its digital content to any buyer. We ensure that the identity of the buyer is only known to the seller. The buyer can verify that the purchased content is genuine. After the transaction is completed only the legitimate current owner can use the digital content. Any illegal use can be identified by a trusted authority.\",\"PeriodicalId\":360339,\"journal\":{\"name\":\"2010 International Conference on Availability, Reliability and Security\",\"volume\":\"2 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-03-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 International Conference on Availability, Reliability and Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ARES.2010.18\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 International Conference on Availability, Reliability and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ARES.2010.18","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Digital content, protected by specific terms of use, is currently delivered to customers via a few selected content providers. Allowing arbitrary entities,not just trusted content providers, to resell legitimately purchased,protected digital content to another entity, adds additional challenges to a DRM environment. In this paper, we formally model the problem of reselling digital content, and we provide a secure construction based on one-time(proxy) signatures. Our construction allows an arbitrary seller to resell its digital content to any buyer. We ensure that the identity of the buyer is only known to the seller. The buyer can verify that the purchased content is genuine. After the transaction is completed only the legitimate current owner can use the digital content. Any illegal use can be identified by a trusted authority.