Tracking Traitors in Web Services via Blind Signatures

This paper presents a method and its implementation, built on the blind signatures protocol, to trace users sharing their licenses illegally when accessing services provided through Internet (Web services, Streaming, etc). The method devised is able to identify the legitimate user from those users w...

Full description

Bibliographic Details
Main Authors: Álvarez Bermejo, José Antonio, López Ramos, Juan Antonio
Format: info:eu-repo/semantics/article
Language:English
Published: 2012
Online Access:http://hdl.handle.net/10835/1520
_version_ 1789406599325941760
author Álvarez Bermejo, José Antonio
López Ramos, Juan Antonio
author_facet Álvarez Bermejo, José Antonio
López Ramos, Juan Antonio
author_sort Álvarez Bermejo, José Antonio
collection DSpace
description This paper presents a method and its implementation, built on the blind signatures protocol, to trace users sharing their licenses illegally when accessing services provided through Internet (Web services, Streaming, etc). The method devised is able to identify the legitimate user from those users who are illegally accessing services with a shared key. This method is robust when detecting licenses built with no authorization. An enhancement of the protocol to identify the last usage of a certain license is also provided, allowing to detect a traitor when an unauthorized copy of a license is used.
format info:eu-repo/semantics/article
id oai:repositorio.ual.es:10835-1520
institution Universidad de Cuenca
language English
publishDate 2012
record_format dspace
spelling oai:repositorio.ual.es:10835-15202023-04-12T19:25:58Z Tracking Traitors in Web Services via Blind Signatures Álvarez Bermejo, José Antonio López Ramos, Juan Antonio This paper presents a method and its implementation, built on the blind signatures protocol, to trace users sharing their licenses illegally when accessing services provided through Internet (Web services, Streaming, etc). The method devised is able to identify the legitimate user from those users who are illegally accessing services with a shared key. This method is robust when detecting licenses built with no authorization. An enhancement of the protocol to identify the last usage of a certain license is also provided, allowing to detect a traitor when an unauthorized copy of a license is used. 2012-05-23T07:47:48Z 2012-05-23T07:47:48Z 2012-05-23 info:eu-repo/semantics/article http://hdl.handle.net/10835/1520 en info:eu-repo/semantics/openAccess
spellingShingle Álvarez Bermejo, José Antonio
López Ramos, Juan Antonio
Tracking Traitors in Web Services via Blind Signatures
title Tracking Traitors in Web Services via Blind Signatures
title_full Tracking Traitors in Web Services via Blind Signatures
title_fullStr Tracking Traitors in Web Services via Blind Signatures
title_full_unstemmed Tracking Traitors in Web Services via Blind Signatures
title_short Tracking Traitors in Web Services via Blind Signatures
title_sort tracking traitors in web services via blind signatures
url http://hdl.handle.net/10835/1520
work_keys_str_mv AT alvarezbermejojoseantonio trackingtraitorsinwebservicesviablindsignatures
AT lopezramosjuanantonio trackingtraitorsinwebservicesviablindsignatures