AN EFFICIENT PROXY SIGNATURE SCHEME IN HOME NETWORK DRM
Xiaoyun Wang
2005
Abstract
In this paper we overview the existing home network DRM schemes and especially Philips’ invention. Then we propose to use the proxy signature to simplify the authentication of certificate chain in Philips’ scheme. And we also give an efficient scheme of proxy signature based on the characters of certificate chain. We then give a detailed security analysis to show that our scheme meets the six properties of proxy signature. Finally the paper points that we should go ahead to improve the efficiency of home network DRM scheme and show a kinder interface to digital home consumers.
References
- Smartright technical white paper.. Retrieved from Thomson company website. Jan. 2005. http://www.smartright.org/images/smr/content/ /SmartRight_tech_whitepaper_jan28.pdf,
- xCP Cluster Protocol. Retrived from IBM company website. Jan 2005 http://www.almaden.ibm.com/software/ds/ContentAssu rance/papers/xCP-DVB.pdf
- Philips patent WO2004027588, Retrieved Jan. 2005, from http://v3.espacenet.com/textdoc?DB=EPODOC&IDX= WO2004027588&F=0
- M. Mambo, K. Usuda and E. Okamoto. Proxy signatures for delegating signing operation. Proc. 3rd ACM Conference on Computer and Communications Security, ACM Press, 1996, 48-57, Retrieved from ACM online database
- M. Mambo, K. Usuda and E. Okamoto. Proxy signatures: Delegation of the power to sign messages. IEICE Trans. Fundam., 1996, E79-A, (9), 1338-1354
- K.Usuda, M.Mambo, T.uyematsu, and E. Okamoto, “Proposal of an automatic signature scheme using a compiler”, IEICE Trans. Fundamentals, vol.E79-A,no.1,1996,pp.48-57.
- S. Kim, S. Park, and D. Won, ”Proxy signatures, revisited”, Proc. Of ICICS'97, International Conference on Information and Communications Security, LNCS 1334, Springer-Verlag, pp. 223-232, 1997. Retrieved from Springer online database
- Li Jiguo, Cao Zhenfu, Zhang Yichen. Improvement of M-U-O and K-P-W Proxy Signature Schemes. Journal of Harbin Institute of Technology. 2002,9(2): 145148.
Paper Citation
in Harvard Style
Wang X. (2005). AN EFFICIENT PROXY SIGNATURE SCHEME IN HOME NETWORK DRM . In Proceedings of the Second International Conference on e-Business and Telecommunication Networks - Volume 2: ICETE, ISBN 972-8865-33-3, pages 191-194. DOI: 10.5220/0001419801910194
in Bibtex Style
@conference{icete05,
author={Xiaoyun Wang},
title={AN EFFICIENT PROXY SIGNATURE SCHEME IN HOME NETWORK DRM},
booktitle={Proceedings of the Second International Conference on e-Business and Telecommunication Networks - Volume 2: ICETE,},
year={2005},
pages={191-194},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0001419801910194},
isbn={972-8865-33-3},
}
in EndNote Style
TY - CONF
JO - Proceedings of the Second International Conference on e-Business and Telecommunication Networks - Volume 2: ICETE,
TI - AN EFFICIENT PROXY SIGNATURE SCHEME IN HOME NETWORK DRM
SN - 972-8865-33-3
AU - Wang X.
PY - 2005
SP - 191
EP - 194
DO - 10.5220/0001419801910194