Work place: State Key Laboratory of Information Security, Institute of Software Chinese Academy of Sciences, Beijing, China
E-mail: zhaosj@is.iscas.ac.cn
Website:
Research Interests: Computing Platform, Mathematics of Computing
Biography
Shijun Zhao. born in 1985. PhD candidate Information Security. He is interested in trusted computing.
By Hao Li Yu Qin Qianying Zhang Shijun Zhao
DOI: https://doi.org/10.5815/ijwmt.2012.04.01, Pub. Date: 15 Aug. 2012
We present a novel solution that allows one platform to securely distribute or redistribute digital contents to another in P2P networks. The solution is based on platforms with Trusted Platform Modules (TPMs). It maintains the confidentiality and freshness of digital contents during the processes of distribution. Given an ideal (tamper-proof) trusted platform, the solution can even withstand attacks by dishonest users during the processes of usage. Moreover, it can also be used to redistribute n-time-use digital content offline, so it is more flexible and scalable than other related distribution solutions to enable widespread deployment. Lastly, by adding a few simple features to TPMs, our solution can easily prevent the malicious sender and receiver from colluding when the redistribution takes place, so we can ensure that they can not gain more than a previously defined amount of rights without contacting the content provider.
[...] Read more.By Hao Li Yu Qin Qianying Zhang Shijun Zhao
DOI: https://doi.org/10.5815/ijcnis.2011.02.04, Pub. Date: 8 Mar. 2011
We present a novel solution that allows one platform to securely distribute or redistribute digital contents to another in P2P networks. The solution includes three protocols (distribution protocol, usage protocol, redistribution protocol) which are all based on platforms with Trusted Platform Modules (TPMs). It maintains the confidentiality and freshness of digital contents during the processes of distribution. Given an ideal (tamper-proof) trusted platform, the solution can even withstand attacks by dishonest users during the processes of usage. Moreover, it can also be used to redistribute n-time-use digital content offline, so it is more flexible and scalable than other related distribution solutions to enable widespread deployment. Lastly, by adding a few simple features to TPMs, our solution can easily prevent the malicious sender and receiver from colluding when the redistribution takes place, so we can ensure that they can not gain more than a previously defined amount of rights without contacting the content provider.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals