Content Protection Scheme to Realize Edit Control Including Diversion Control and Composition Control

@inproceedings{Fujimoto2016ContentPS,
  title={Content Protection Scheme to Realize Edit Control Including Diversion Control and Composition Control},
  author={Tatsuya Fujimoto and Keiichi Iwamura and Masaki Inamura},
  booktitle={ICE-B},
  year={2016}
}
We have proposed a copyright protection technology suitable for editable contents, which can control the change, deletion, and addition of partial contents. In this paper, we propose a new scheme that can control the diversion of partial contents to other contents and composition of contents, in addition to control of the change, deletion, and addition of partial contents using digital signatures based on the author’s intention. This scheme realizes edit control between two or more contents… 

Figures from this paper

A Content Protection Method That Allows Commissioning of Editing Control Processing to a Third Party using a Proxy Signature

A method in which the author can securely provide individual editing permissions for content that has been editing-prohibited is proposed, which offers a way to securely buy and sell the right to edit content in exchange for money.

Content Protection Method to Control Editing by Billing

This work proposes a method in which the author can securely provide individual editing permissions for content that has been sent as editing-prohibited, and offers a way to securely buy and sell the right to edit content in exchange for money.

References

SHOWING 1-4 OF 4 REFERENCES

Content control scheme to realize right succession and edit control

A copyright protection technology suitable for consumer generated media such as You Tube and CLIP is proposed, which uses a digital signature to confirm the relation between the primary and secondary authors and to determine whether the contents may be edited.

Short Signatures from the Weil Pairing

A short signature scheme based on the Computational Diffie–Hellman assumption on certain elliptic and hyperelliptic curves is introduced for systems where signatures are typed in by a human or are sent over a low-bandwidth channel.

Aggregate and Verifiably Encrypted Signatures from Bilinear Maps

This paper constructs an efficient aggregate signature from a recent short signature scheme based on bilinear maps due to Boneh, Lynn, and Shacham, and shows that aggregate signatures give rise to verifiably encrypted signatures.