Shijun Zhao

Work place: State Key Laboratory of Information Security, Institute of Software Chinese Academy of Sciences, Beijing, China

E-mail: zhaosj@is.iscas.ac.cn

Website:

Research Interests: Computing Platform, Mathematics of Computing

Biography

Shijun Zhao. born in 1985. PhD candidate Information Security. He is interested in trusted computing.

Author Articles
Securing Peer-to-Peer Distributions with Trusted Platform Modules

By Hao Li Yu Qin Qianying Zhang Shijun Zhao

DOI: https://doi.org/10.5815/ijwmt.2012.04.01, Pub. Date: 15 Aug. 2012

We present a novel solution that allows one platform to securely distribute or redistribute digital contents to another in P2P networks. The solution is based on platforms with Trusted Platform Modules (TPMs). It maintains the confidentiality and freshness of digital contents during the processes of distribution. Given an ideal (tamper-proof) trusted platform, the solution can even withstand attacks by dishonest users during the processes of usage. Moreover, it can also be used to redistribute n-time-use digital content offline, so it is more flexible and scalable than other related distribution solutions to enable widespread deployment. Lastly, by adding a few simple features to TPMs, our solution can easily prevent the malicious sender and receiver from colluding when the redistribution takes place, so we can ensure that they can not gain more than a previously defined amount of rights without contacting the content provider.

[...] Read more.
Securing the Distributions in P2P Networks with Trusted Platform Modules

By Hao Li Yu Qin Qianying Zhang Shijun Zhao

DOI: https://doi.org/10.5815/ijcnis.2011.02.04, Pub. Date: 8 Mar. 2011

We present a novel solution that allows one platform to securely distribute or redistribute digital contents to another in P2P networks. The solution includes three protocols (distribution protocol, usage protocol, redistribution protocol) which are all based on platforms with Trusted Platform Modules (TPMs). It maintains the confidentiality and freshness of digital contents during the processes of distribution. Given an ideal (tamper-proof) trusted platform, the solution can even withstand attacks by dishonest users during the processes of usage. Moreover, it can also be used to redistribute n-time-use digital content offline, so it is more flexible and scalable than other related distribution solutions to enable widespread deployment. Lastly, by adding a few simple features to TPMs, our solution can easily prevent the malicious sender and receiver from colluding when the redistribution takes place, so we can ensure that they can not gain more than a previously defined amount of rights without contacting the content provider.

[...] Read more.
Other Articles