Right Transfer Method Based on Double HASH Chain
2014 ◽
Vol 631-632
◽
pp. 952-957
Keyword(s):
This Paper analyzes security issues during the process of the right transfer, sums up the basic needs during the transfer and the defects of existing rights transfer, and puts forward the right transfer program based on double HASH chain, which achieves the transfer of the digital right under the control of HASH Distance and meta-rights. Security analysis shows that the authentication, integrity, confidentiality, and impartiality of the program are well guaranteed.
2022 ◽
Vol 16
(1)
◽
pp. 0-0
2018 ◽
Vol 2018
◽
pp. 1-7
◽
Keyword(s):
2016 ◽
Vol 1
(2)
◽
pp. 59
Keyword(s):
Keyword(s):
Keyword(s):
Keyword(s):