Skip to main content

A Novel Digital Rights Management in P2P Networks Based on Bitcoin System

  • Conference paper
  • First Online:
Frontiers in Cyber Security (FCS 2018)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 879))

Included in the following conference series:

Abstract

In recent years, digital rights management (DRM) in Peer to Peer (P2P) network becomes more and more important. We propose a novel DRM scheme based on P2P to protect valuable digital content. The digital content is firstly encrypted with a symmetric cryptographic algorithm, and then the symmetric key is encrypted by the RSA scheme such that any unpaid user cannot access the digital content. The symmetric key is only held by the content provider for avoiding the risk of the server leaking the symmetric key. By exploiting Bitcoin system, the content provider and the user have the ability to make a direct payment without relying on the server. Moreover, the payment is a timely payment, that is, when the user’s payment is completed, he/she will obtain the private key of RSA immediately. In our scheme, users can download ciphertext of the digital content from any peer who owns the digital content early. In addition, a payment voucher is used to verify users who have paid for the digital content, which can also against the collusion attack. We anonymize the authentication process for protecting the users’ privacy. The security analysis shows that our scheme can provide message confidentiality, anonymity of users, and can resist poisoning attack and collusion attack. The simulation shows that our scheme is efficient and practical.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Kitahara, M., Kawamoto, J., Sakurai, K.: A method of digital rights management based on Bitcoin protocol. In: Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, p. 84. ACM (2014)

    Google Scholar 

  2. Liu, Y., Yuan, C., Zhong, Y.-Z.: Implementing digital right management in P2P content sharing system. In: Jin, H., Rana, Omer F., Pan, Y., Prasanna, Viktor K. (eds.) ICA3PP 2007. LNCS, vol. 4494, pp. 348–355. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-72905-1_31

    Chapter  Google Scholar 

  3. Petrlic, R., Sorge, C.: Privacy-preserving DRM for cloud computing. In: 26th International Conference Advanced Information Networking and Applications Workshops (WAINA), pp. 1286–1291. IEEE (2012)

    Google Scholar 

  4. Huang, Q., Ma, Z.F., Fu, J.Y.: Privacy-preserving digital rights management scheme in cloud computing. J. Commun. 35(2), 95–103 (2014)

    Google Scholar 

  5. Zhang, J., Cai, J., Zhang, Z.: A novel digital rights management mechanism on peer-to-peer streaming system. In: Pan, J.S., Tsai, P.W., Huang, H.C. (eds.) Advances in Intelligent Information Hiding and Multimedia Signal Processing. SIST, vol. 63, pp. 243–250. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-50209-0_30

    Chapter  Google Scholar 

  6. Feng, J., Kong, R., Wang, Y.: A novel digital rights management scheme in P2P networks. Commun. Netw. 2(4), 230–234 (2010)

    Article  Google Scholar 

  7. Su, M., Zhang, H., Duy, X., Dai, Q.: A novel stochastic-encryption-based P2P digital rights management scheme. In: IEEE International Conference Communications (ICC), pp. 5541–5545. IEEE (2015)

    Google Scholar 

  8. Fujimura, K., Nakajima, Y.: General-purpose digital ticket framework. In: USENIX Workshop on Electronic Commerce, pp. 177–186 (1998)

    Google Scholar 

  9. Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. Consulted (2008)

    Google Scholar 

  10. Wang, Y., Gao, J.: A regulation scheme based on the ciphertext-policy hierarchical attribute-based encryption in Bitcoin system. IEEE Access 6, 16267–16278 (2018)

    Article  Google Scholar 

  11. Tschorsch, F., Scheuermann, B.: Bitcoin and beyond: a technical survey on decentralized digital currencies. IEEE Commun. Surv. Tutor. 18(3), 2084–2123 (2016)

    Article  Google Scholar 

  12. Rogaway, P., Shrimpton, T.: Cryptographic hash-function basics: definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol. 3017, pp. 371–388. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-25937-4_24

    Chapter  Google Scholar 

  13. Iwata, T., Abe, T., Ueda, K., Sunaga, H.: A DRM system suitable for P2P content delivery and the study on its implementation. In: The 9th Asia-Pacific Conference on Communications, APCC 2003, vol. 2, pp. 806–811. IEEE (2003)

    Google Scholar 

  14. Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signature and public key cryptosystems. Commun. ACM 21, 120–126 (1978)

    Article  MathSciNet  Google Scholar 

  15. National Bureau of Standards (NBS). NBS FIPS PUBS 197: Advanced Encryption Standard; U.S. Department of Commerce, Washington, DC, USA, November 2001

    Google Scholar 

  16. Koblitz, N.: Elliptic curve cryptosystems. Math. Comput. 48(177), 203–209 (1987)

    Article  MathSciNet  Google Scholar 

  17. Bellare, M., Desai, A., Pointcheval, D., Rogaway, P.: Relations among notions of security for public-key encryption schemes. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 26–45. Springer, Heidelberg (1998). https://doi.org/10.1007/BFb0055718

    Chapter  Google Scholar 

  18. Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457–473. Springer, Heidelberg (2005). https://doi.org/10.1007/11426639_27

    Chapter  Google Scholar 

  19. ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 31(4), 469–472 (1985)

    Article  MathSciNet  Google Scholar 

  20. Qiu, Q., Tang, Z., Yu, Y.: A decentralized authorization scheme for DRM in P2P file-sharing systems. In: 2011 IEEE Consumer Communications and Networking Conference (CCNC), pp. 136–140. IEEE (2011)

    Google Scholar 

  21. Reinicke, B., Cummings, J., Kleinberg, H.: The right to digital self-defense. IEEE Secur. Priv. 15(4), 68–71 (2017)

    Article  Google Scholar 

  22. Liu, J., Hu, Y.: A New Digital Rights Management Solution Based on White-Box Cryptography. https://eprint.iacr.org. Accessed 21 May 2018

  23. Chen, Y.M., Wu, W.C.: An anonymous DRM scheme for sharing multimedia files in P2P networks. Multimed. Tools Appl. 69(3), 1041–1065 (2014)

    Article  Google Scholar 

  24. Andrychowicz, M., Dziembowski, S., Malinowski, D., Mazurek, Ł.: Fair two-party computations via bitcoin deposits. In: Böhme, R., Brenner, M., Moore, T., Smith, M. (eds.) FC 2014. LNCS, vol. 8438, pp. 105–121. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-662-44774-1_8

    Chapter  Google Scholar 

  25. Hwang, R.J., Lai, C.H.: Provable fair document exchange protocol with transaction privacy for e-commerce. Symmetry 7(2), 464–487 (2015)

    Article  MathSciNet  Google Scholar 

Download references

Acknowledge

This work is supported in part by the National Key Research and Development Program of China (No. 2016YFB0800601), the Natural Science Foundation of China (No. 61303217, 61502372), the Natural Science Foundation of Shaanxi province (No. 2013JQ8002, 2014JQ8313).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Juntao Gao .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wang, D., Gao, J., Yu, H., Li, X. (2018). A Novel Digital Rights Management in P2P Networks Based on Bitcoin System. In: Li, F., Takagi, T., Xu, C., Zhang, X. (eds) Frontiers in Cyber Security. FCS 2018. Communications in Computer and Information Science, vol 879. Springer, Singapore. https://doi.org/10.1007/978-981-13-3095-7_18

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-3095-7_18

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-3094-0

  • Online ISBN: 978-981-13-3095-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics