Added php_mcrypt.so and php_pdo_pgsql.so extension to php.ini.
Migration of the sample database.
Routing of the sample website.
Deployment of a sample Laverel.
Read primitive of DRM algorithms:
Broadcast Encryption: Shamir’s Secret Sharing k out of n. Any k + 1 participants can then combine their shares to recover s via interpolation. each authorized recipient deduces the secret, while all others deduce nonsense. Can I use the server as the very vital K?
Traitor Tracing:Each user holds a decryption key that is fingerprinted and bound to his identity. In the case of a leakage, a specialized traitor tracing algorithm ensures that the identities of the leaking entities (the traitors) can be revealed.
Tracing Based on Leaked Decryption Keys: Boneh and Franklin[17] Boneh and Shaw[22]
Tracing Based on Leaked Decrypted Content: watermarking techniques. First, personalized keys are distributed to the users via any broadcast encryption scheme; then, each variant is encrypted under its own key.
These tracing methods are suitable for subscription. But my goal is to maximise the leaking cost of the content after decryption.
public-key or symmetric-key based:
####Jan 10, 2015####
Recently I have been looking at the authentication and security side of my PHP server, especially for integrating with the Digital Right Management (DRM) system. I adopted the Laravel framework, for class autoloading, front controller routing and authentication.
####Jan 9, 2015####
Moved user and group file into global static variables, which provides easy access from different controllers.