Tracking Traitors in Web Services via Blind Signatures
This paper presents a method and its implementation, built on the blind signatures protocol, to trace users sharing their licenses illegally when accessing services provided through Internet (Web services, Streaming, etc). The method devised is able to identify the legitimate user from those users w...
Main Authors: | , |
---|---|
Format: | info:eu-repo/semantics/article |
Language: | English |
Published: |
2012
|
Online Access: | http://hdl.handle.net/10835/1520 |
_version_ | 1789406599325941760 |
---|---|
author | Álvarez Bermejo, José Antonio López Ramos, Juan Antonio |
author_facet | Álvarez Bermejo, José Antonio López Ramos, Juan Antonio |
author_sort | Álvarez Bermejo, José Antonio |
collection | DSpace |
description | This paper presents a method and its implementation, built on the blind signatures protocol, to trace users sharing their licenses illegally when accessing services provided through Internet (Web services, Streaming, etc). The method devised is able to identify the legitimate user from those users who are illegally accessing services with a shared key. This method is robust when detecting licenses built with no authorization. An enhancement of the protocol to identify the last usage of a certain license is also provided, allowing to detect a traitor when an unauthorized copy of a license is used. |
format | info:eu-repo/semantics/article |
id | oai:repositorio.ual.es:10835-1520 |
institution | Universidad de Cuenca |
language | English |
publishDate | 2012 |
record_format | dspace |
spelling | oai:repositorio.ual.es:10835-15202023-04-12T19:25:58Z Tracking Traitors in Web Services via Blind Signatures Álvarez Bermejo, José Antonio López Ramos, Juan Antonio This paper presents a method and its implementation, built on the blind signatures protocol, to trace users sharing their licenses illegally when accessing services provided through Internet (Web services, Streaming, etc). The method devised is able to identify the legitimate user from those users who are illegally accessing services with a shared key. This method is robust when detecting licenses built with no authorization. An enhancement of the protocol to identify the last usage of a certain license is also provided, allowing to detect a traitor when an unauthorized copy of a license is used. 2012-05-23T07:47:48Z 2012-05-23T07:47:48Z 2012-05-23 info:eu-repo/semantics/article http://hdl.handle.net/10835/1520 en info:eu-repo/semantics/openAccess |
spellingShingle | Álvarez Bermejo, José Antonio López Ramos, Juan Antonio Tracking Traitors in Web Services via Blind Signatures |
title | Tracking Traitors in Web Services via Blind Signatures |
title_full | Tracking Traitors in Web Services via Blind Signatures |
title_fullStr | Tracking Traitors in Web Services via Blind Signatures |
title_full_unstemmed | Tracking Traitors in Web Services via Blind Signatures |
title_short | Tracking Traitors in Web Services via Blind Signatures |
title_sort | tracking traitors in web services via blind signatures |
url | http://hdl.handle.net/10835/1520 |
work_keys_str_mv | AT alvarezbermejojoseantonio trackingtraitorsinwebservicesviablindsignatures AT lopezramosjuanantonio trackingtraitorsinwebservicesviablindsignatures |