By Topic

An encryption scheme for limited k-time access to digital media

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Perkins, G.M. ; Panasonic Inf. & Networking Technol. Lab., Princeton, NJ, USA ; Bhattacharya, P.

Digital content needs to be protected against piracy yet readily accessible to the user. Furthermore, the digital content may come with a proper use license which concerns how the content may be used by the purchaser/user. In this paper we describe a method fir protecting digital content from piracy where the "proper use license" is a k-time license. This license says that the digital content may be used/accessed at most k times. To protect the digital content from piracy or misuse we provide an application that will decrypt and re-encrypt the content according to our k-time encryption scheme. Since secret keys must reside on the user's system, we heighten the level of security by hiding secret keys in the heuristic solutions of NP-hard problems and by extending the security with some other well known methods.

Published in:

Consumer Electronics, IEEE Transactions on  (Volume:49 ,  Issue: 1 )