In this report, we discuss the problem of protecting digital information such as software, document, music and video from illegal redistribution by an authorized user, and present some efficient eneryption schemes and group signature techniques.RGM 16/9