Skip to main content

Broadcast Encryption-Based P2P DRM without Central License Server

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 5879))

Abstract

As P2P technique is broadly used for content distribution today, copyright infringement becomes a big problem. Thus we propose a DRM scheme over P2P network by establishing an access control mechanism for shared digital content. Compared with the traditional PKI, broadcast encryption is considered as more suitable for constructing P2P DRM system. But the existence of a central license server would not only cause single point of failure but also bring bottleneck problem. In this paper, we describe a basic implementation of broadcast encryption-based P2P DRM system first. Then we present a general scheme with focus on how to decentralize the license agency to reserve the flexibility of P2P network. At last we analyze its security, evaluate its efficiency and point out a tradeoff between the two system parameters.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Subramanya, S.R., Yi, B.K.: Digital rights management. Potentials. IEEE 25(2), 31–34 (2006)

    Google Scholar 

  2. Berkovits, S.: How To Broadcast A Secret. In: Barahona, P., Porto, A., Moniz Pereira, L. (eds.) EPIA 1991. LNCS, vol. 541, pp. 535–541. Springer, Heidelberg (1991)

    Google Scholar 

  3. Fiat, A., Naor, M.: Broadcast Encryption. In: Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology, pp. 480–491 (1994)

    Google Scholar 

  4. Naor, M., Pinkas, B.: Efficient Trace and Revoke Schemes. In: Proceedings of the 4th International Conference on Financial Cryptography, pp. 1–20 (2000)

    Google Scholar 

  5. Naor, D., Naor, M., Lotspiech, J.: Revocation and Tracing Schemes for Stateless Receivers. In: Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology, pp. 41–62 (2001)

    Google Scholar 

  6. Halevy, D., Shamir, A.: The LSD Broadcast Encryption Scheme. In: Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology, pp. 47–61 (2002)

    Google Scholar 

  7. Dodis, Y., Fazio, N.: Public Key Broadcast Encryption for Stateless Receivers. In: Feigenbaum, J. (ed.) DRM 2002. LNCS, vol. 2696, pp. 61–80. Springer, Heidelberg (2003)

    Google Scholar 

  8. Boneh, D., Gentry, C., Waters, B.: Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 258–275. Springer, Heidelberg (2005)

    Google Scholar 

  9. Lotspiech, J., Nusser, S., Pestoni, F.: Broadcast Encryption’s Bright Future. Computer 35(8), 57–63 (2002)

    Article  Google Scholar 

  10. Lotspiech, J., Nusser, S., Pestoni, F.: Anonymous Trust: Digital Rights Management Using Broadcast Encryption. Proceedings of the IEEE 92(6), 898–909 (2004)

    Article  Google Scholar 

  11. Wallner, D.M., Harder, E.J., Agee, R.C.: Key management for multicast: Issues and architectures. RFC2627(informational) (1999)

    Google Scholar 

  12. Wong, C.K., Gouda, M., Lam, S.: Secure group communications using key graghs. In: SIGCOMM1998, pp. 68–79. ACM Press, New York (1998)

    Google Scholar 

  13. Pestoni, F., Lotspiech, J., Nusser, S.: xCP: Peer-to-Peer Content Protection. IEEE Signal Processing Magazine 21(2), 71–81 (2004)

    Article  Google Scholar 

  14. Zhang, Y., Yuan, C., Zhong, Y.: Implementing DRM over Peer-to-Peer Networks with Broadcast Encryption. In: Ip, H.H.-S., Au, O.C., Leung, H., Sun, M.-T., Ma, W.-Y., Hu, S.-M. (eds.) PCM 2007. LNCS, vol. 4810, pp. 236–245. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  15. Maymounkov, P., Mazières, D.: Kademlia: A Peer-to-peer Information System Based on the XOR Metric. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 53–65. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  16. Kumar, V.: Trust and Security in Peer-to-Peer System. In: Proceedings of the 17th International Conference on Database and Expert Systems Applications, pp. 703–707 (2006)

    Google Scholar 

  17. Luo, X., Qin, Z., Geng, J., Wu, C.: P2PFAIR: Fair Exchange in P2P Sharing System without Dedicated TTP. Communications and Networking in China, 1–5 (2006)

    Google Scholar 

  18. Menezes, A., van Oorshchot, P., Vanstone, S.: Handbook of Applied Cryptographic. CRC Press, Boca Raton (1996)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Liu, L., Yuan, C. (2009). Broadcast Encryption-Based P2P DRM without Central License Server . In: Muneesawang, P., Wu, F., Kumazawa, I., Roeksabutr, A., Liao, M., Tang, X. (eds) Advances in Multimedia Information Processing - PCM 2009. PCM 2009. Lecture Notes in Computer Science, vol 5879. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-10467-1_39

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-10467-1_39

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-10466-4

  • Online ISBN: 978-3-642-10467-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics