北京邮电大学学报

  • EI核心期刊

北京邮电大学学报 ›› 2013, Vol. 36 ›› Issue (6): 7-12.doi: 10.13190/j.jbupt.2013.06.002

• 论文 • 上一篇    下一篇

基于代理重加密的多媒体数字版权授权协议

黄勤龙1,2, 马兆丰1,2, 傅镜艺1,2, 钮心忻1   

  1. 1. 北京邮电大学 信息安全中心, 北京 100876;
    2. 北京国泰信安科技有限公司, 北京 100086
  • 收稿日期:2013-01-16 出版日期:2013-12-31 发布日期:2013-10-08
  • 作者简介:黄勤龙(1988—),男,博士生,E-mail:longsec@bupt.edu.cn;马兆丰(1974—),男,副教授.
  • 基金资助:

    国家自然科学基金项目(60803157, 90812001, 61272519)

Authorization Protocol of Multimedia Digital Rights Management Based on Proxy Re-Encryption

HUANG Qin-long1,2, MA Zhao-feng1,2, FU Jing-yi1,2, NIU Xin-xin1   

  1. 1. Information Security Center, Beijing University of Posts and Telecommunications, Beijing 100876, China;
    2. Beijing National Security Science and Technology Company Limited, Beijing 100086, China
  • Received:2013-01-16 Online:2013-12-31 Published:2013-10-08

摘要:

针对数字内容使用和共享中版权保护的问题,提出一种基于代理重加密的多媒体数字版权授权协议. 该协议允许内容提供商在客户端加密多媒体内容,内容使用者获取加密的多媒体内容后向许可证服务器申请许可证,内容使用者下载许可证后向密钥代理服务器提交内容加密密钥重加密申请,密钥代理服务器重加密内容加密密钥后返回给内容使用者,而许可证服务器无法获取内容加密密钥明文. 在该协议的基础上,实现了云计算环境下的数字电视节目内容共享平台. 对比结果和实际运行情况表明,该协议在内容使用和共享过程中不需要重新加密内容,能有效抵抗合谋攻击,效率及安全性较高.

关键词: 数字版权管理, 代理重加密, 内容共享, 许可授权

Abstract:

In order to protect the copyright of digital content, an authorization protocol of multimedia digital rights management based on proxy re-encryption is proposed. The proposed protocol allows content providers to encrypt multimedia content on their clients, and allows the users to share the encrypted multimedia content and apply license from license server. After obtaining the license, the users can apply the content encryption key from key proxy server. The key proxy server re-encrypts the content encryption key and sends the encrypted content encryption key to the users, while license server cannot get the content encryption key. Based on the proposed protocol, a content sharing platform for digital TV programs in cloud computing is developed. The comparison results and practical application show that the proposed protocol does not need to re-encrypt content when sharing, and can effectively resist the collision attacks, which is efficient and secure.

Key words: digital rights management, proxy re-encryption, content sharing, authorization

中图分类号: