Advertisement

Applicability of Public Key Cryptosystems to Digital Rights Management Applications

Conference paper
  • 478 Downloads
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2339)

Abstract

Applications that incorporate Digital Rights Management (DRM) capabilities are enabled to specify, implement and manage the rights and permissions associated with the use of intangible goods. Many different inter-related technologies can be incorporated into DRM enabled applications including technology that incorporates public key cryptography. The success of DRM enabled applications will depend on how well the solutions satisfy requirements of the different stakeholders involved with the production, distribution and use of intangible goods. A key success factor is the ability of an application to provide superior ease of use from the end user’s perspective. The success also depends on how well the application can adapt to new technology and emerging distribution and business models. This paper describes DRM applications, the requirements of the different stakeholders in this environment and critical attributes of public key cryptosystems that must be considered to ensure effective solutions.

Keywords

Security Protocol Digital Right Management Infrastructure Provider Stakeholder Requirement Change Business Model 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag Berlin Heidelberg 2002

Authors and Affiliations

  1. 1.NTRU Cryptosystems, Inc.BurlingtonUSA

Personalised recommendations