2016 IEEE International Conference of Online Analysis and Computing Science (ICOACS) 2016
DOI: 10.1109/icoacs.2016.7563117
|View full text |Cite
|
Sign up to set email alerts
|

Efficient functional encryption and proxy re-cryptography for secure public cloud data sharing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
11
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(11 citation statements)
references
References 6 publications
0
11
0
Order By: Relevance
“…More precisely, DRM systems do not actually define watermarking protocols, but they still implement mechanisms by which to prevent the unauthorized use of protected digital content without payment. To achieve such a goal, DRM systems use technologies based on encryption and key management [34]. However, such technologies cannot inhibit legitimate users from illegally sharing their purchased content on the Internet.…”
Section: Related Workmentioning
confidence: 99%
“…More precisely, DRM systems do not actually define watermarking protocols, but they still implement mechanisms by which to prevent the unauthorized use of protected digital content without payment. To achieve such a goal, DRM systems use technologies based on encryption and key management [34]. However, such technologies cannot inhibit legitimate users from illegally sharing their purchased content on the Internet.…”
Section: Related Workmentioning
confidence: 99%
“…Existing mainstream or novel DRM mechanisms include but are not limited to encapsulated encryption and confusion [2,3,4,5], digital watermarks [6,7,8,9,10,11,12,13,14], blockchain [15,16], trusted computing [17,18], biological features [19], etc. After reviewing the previous schemes, we believe that existing DRM technologies still have great defects.…”
Section: Introductionmentioning
confidence: 99%
“…In this paper, we propose Y-DWMS, a digital watermarking management system based on a public smart contract platform. We summarize the contributions of the paper as follows:Y-DWMS can effectively recover losses of copyright holders and track infringers, reward informers, and punish infringers at the moment of reporting, compared with [4,5,15,17,19,20]. In the common smart contract platform, the punishment of infringers could be compensated by informers if there are malicious smart contracts signed between infringers and informers.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations