Telecommunication and information techniques and system III

In this report, we discuss the problem of protecting digital information such as software, document, music and video from illegal redistribution by an authorized user, and present some efficient eneryption schemes and group signature techniques.

Bibliographic Details
Main Authors: Chua, Hock Chuan, Ma, Jianfeng, Lu, Xugang, Chiam, Tee Chye, Li, Gang
Format: Research Report
Published: 2008
Subjects:
Online Access:http://hdl.handle.net/10356/2750
Description
Summary:In this report, we discuss the problem of protecting digital information such as software, document, music and video from illegal redistribution by an authorized user, and present some efficient eneryption schemes and group signature techniques.