Published: April 13, 2010
Author(s)
R. Perlman, C. Kaufman, Ray Perlner
Conference
Name: 9th Symposium on Identity and Trust on the Internet (IDtrust '10)
Dates: 04/13/2010 - 04/15/2010
Location: Gaithersburg, Maryland, United States
Citation: Proceedings of the 9th Symposium on Identity and Trust on the Internet (IDTRUST '10), pp. 69-83
This paper describes and contrasts two families of schemes that enable a user to purchase digital content without revealing to anyone what item he has purchased. One of the basic schemes is based on anonymous cash, and the other on blind decryption. In addition to the basic schemes, we present and compare enhancements to the schemes for supporting additional features such as variable costs, enforcement of access restrictions (such as over age 21 ), and the ability of a user to monitor and prevent covert privacy-leaking between a content-provider-provided box and the content provider. As we will show, the different variants have different properties in terms of amount of privacy leaking, efficiency, and ability for the content provider to prevent sharing of encryption keys or authorization credentials.
This paper describes and contrasts two families of schemes that enable a user to purchase digital content without revealing to anyone what item he has purchased. One of the basic schemes is based on anonymous cash, and the other on blind decryption. In addition to the basic schemes, we present and...
See full abstract
This paper describes and contrasts two families of schemes that enable a user to purchase digital content without revealing to anyone what item he has purchased. One of the basic schemes is based on anonymous cash, and the other on blind decryption. In addition to the basic schemes, we present and compare enhancements to the schemes for supporting additional features such as variable costs, enforcement of access restrictions (such as over age 21 ), and the ability of a user to monitor and prevent covert privacy-leaking between a content-provider-provided box and the content provider. As we will show, the different variants have different properties in terms of amount of privacy leaking, efficiency, and ability for the content provider to prevent sharing of encryption keys or authorization credentials.
Hide full abstract
Keywords
algorithms; blindable parameterizable public key; cryptography; Digital Rights Management; DRM
Control Families
None selected