The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. ex. Some numerals are expressed as "XNUMX".
Copyrights notice
The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. Copyrights notice
Aujourd'hui, le piratage de logiciels constitue une préoccupation majeure pour le commerce électronique, car un produit numérisé tel qu'un logiciel est vulnérable à la redistribution et à l'utilisation non autorisée. Cet article présente un modèle amélioré de distribution électronique de logiciels et de protection des logiciels. Le schéma d'authentification du modèle proposé est basé sur une preuve sans connaissance (ZK) qui nécessite des calculs limités. Le modèle proposé considère la sécurité post-installation à l'aide d'un agent d'authentification. Il empêche le piratage de logiciels et la copie illégale. Il fournit également un mécanisme de mise à jour logicielle en direct sécurisé et efficace basé sur un système de recherche des traîtres. Même si un logiciel ou une clé personnelle est copié illégalement, un commerçant peut retracer son propriétaire d'origine à partir de la licence électronique et de la clé personnelle. Le modèle proposé offre une sécurité et des performances et une sûreté raisonnables.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copier
Sung-Min LEE, Tai-Yun KIM, "A Secure and Efficient Software Protection Model for Electronic Commerce" in IEICE TRANSACTIONS on Communications,
vol. E84-B, no. 11, pp. 2997-3005, November 2001, doi: .
Abstract: Today software piracy is a major concern to electronic commerce since a digitized product such as software is vulnerable to redistribution and unauthorized use. This paper presents an enhanced electronic software distribution and software protection model. Authentication scheme of the proposed model is based on zero-knowledge (ZK) proof which requires limited computation. The proposed model considers post installation security using authentication agent. It prevents software piracy and illegal copy. It also provides secure and efficient software live-update mechanism based on traitor tracing scheme. Even if software or personal key is copied illegally, a merchant can trace back to its original owner from the electronic license and personal key. The proposed model provides security and reasonable performance and safety.
URL: https://global.ieice.org/en_transactions/communications/10.1587/e84-b_11_2997/_p
Copier
@ARTICLE{e84-b_11_2997,
author={Sung-Min LEE, Tai-Yun KIM, },
journal={IEICE TRANSACTIONS on Communications},
title={A Secure and Efficient Software Protection Model for Electronic Commerce},
year={2001},
volume={E84-B},
number={11},
pages={2997-3005},
abstract={Today software piracy is a major concern to electronic commerce since a digitized product such as software is vulnerable to redistribution and unauthorized use. This paper presents an enhanced electronic software distribution and software protection model. Authentication scheme of the proposed model is based on zero-knowledge (ZK) proof which requires limited computation. The proposed model considers post installation security using authentication agent. It prevents software piracy and illegal copy. It also provides secure and efficient software live-update mechanism based on traitor tracing scheme. Even if software or personal key is copied illegally, a merchant can trace back to its original owner from the electronic license and personal key. The proposed model provides security and reasonable performance and safety.},
keywords={},
doi={},
ISSN={},
month={November},}
Copier
TY - JOUR
TI - A Secure and Efficient Software Protection Model for Electronic Commerce
T2 - IEICE TRANSACTIONS on Communications
SP - 2997
EP - 3005
AU - Sung-Min LEE
AU - Tai-Yun KIM
PY - 2001
DO -
JO - IEICE TRANSACTIONS on Communications
SN -
VL - E84-B
IS - 11
JA - IEICE TRANSACTIONS on Communications
Y1 - November 2001
AB - Today software piracy is a major concern to electronic commerce since a digitized product such as software is vulnerable to redistribution and unauthorized use. This paper presents an enhanced electronic software distribution and software protection model. Authentication scheme of the proposed model is based on zero-knowledge (ZK) proof which requires limited computation. The proposed model considers post installation security using authentication agent. It prevents software piracy and illegal copy. It also provides secure and efficient software live-update mechanism based on traitor tracing scheme. Even if software or personal key is copied illegally, a merchant can trace back to its original owner from the electronic license and personal key. The proposed model provides security and reasonable performance and safety.
ER -