Abstract
In recent years, digital rights management (DRM) in Peer to Peer (P2P) network becomes more and more important. We propose a novel DRM scheme based on P2P to protect valuable digital content. The digital content is firstly encrypted with a symmetric cryptographic algorithm, and then the symmetric key is encrypted by the RSA scheme such that any unpaid user cannot access the digital content. The symmetric key is only held by the content provider for avoiding the risk of the server leaking the symmetric key. By exploiting Bitcoin system, the content provider and the user have the ability to make a direct payment without relying on the server. Moreover, the payment is a timely payment, that is, when the user’s payment is completed, he/she will obtain the private key of RSA immediately. In our scheme, users can download ciphertext of the digital content from any peer who owns the digital content early. In addition, a payment voucher is used to verify users who have paid for the digital content, which can also against the collusion attack. We anonymize the authentication process for protecting the users’ privacy. The security analysis shows that our scheme can provide message confidentiality, anonymity of users, and can resist poisoning attack and collusion attack. The simulation shows that our scheme is efficient and practical.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Kitahara, M., Kawamoto, J., Sakurai, K.: A method of digital rights management based on Bitcoin protocol. In: Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, p. 84. ACM (2014)
Liu, Y., Yuan, C., Zhong, Y.-Z.: Implementing digital right management in P2P content sharing system. In: Jin, H., Rana, Omer F., Pan, Y., Prasanna, Viktor K. (eds.) ICA3PP 2007. LNCS, vol. 4494, pp. 348–355. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-72905-1_31
Petrlic, R., Sorge, C.: Privacy-preserving DRM for cloud computing. In: 26th International Conference Advanced Information Networking and Applications Workshops (WAINA), pp. 1286–1291. IEEE (2012)
Huang, Q., Ma, Z.F., Fu, J.Y.: Privacy-preserving digital rights management scheme in cloud computing. J. Commun. 35(2), 95–103 (2014)
Zhang, J., Cai, J., Zhang, Z.: A novel digital rights management mechanism on peer-to-peer streaming system. In: Pan, J.S., Tsai, P.W., Huang, H.C. (eds.) Advances in Intelligent Information Hiding and Multimedia Signal Processing. SIST, vol. 63, pp. 243–250. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-50209-0_30
Feng, J., Kong, R., Wang, Y.: A novel digital rights management scheme in P2P networks. Commun. Netw. 2(4), 230–234 (2010)
Su, M., Zhang, H., Duy, X., Dai, Q.: A novel stochastic-encryption-based P2P digital rights management scheme. In: IEEE International Conference Communications (ICC), pp. 5541–5545. IEEE (2015)
Fujimura, K., Nakajima, Y.: General-purpose digital ticket framework. In: USENIX Workshop on Electronic Commerce, pp. 177–186 (1998)
Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. Consulted (2008)
Wang, Y., Gao, J.: A regulation scheme based on the ciphertext-policy hierarchical attribute-based encryption in Bitcoin system. IEEE Access 6, 16267–16278 (2018)
Tschorsch, F., Scheuermann, B.: Bitcoin and beyond: a technical survey on decentralized digital currencies. IEEE Commun. Surv. Tutor. 18(3), 2084–2123 (2016)
Rogaway, P., Shrimpton, T.: Cryptographic hash-function basics: definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol. 3017, pp. 371–388. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-25937-4_24
Iwata, T., Abe, T., Ueda, K., Sunaga, H.: A DRM system suitable for P2P content delivery and the study on its implementation. In: The 9th Asia-Pacific Conference on Communications, APCC 2003, vol. 2, pp. 806–811. IEEE (2003)
Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signature and public key cryptosystems. Commun. ACM 21, 120–126 (1978)
National Bureau of Standards (NBS). NBS FIPS PUBS 197: Advanced Encryption Standard; U.S. Department of Commerce, Washington, DC, USA, November 2001
Koblitz, N.: Elliptic curve cryptosystems. Math. Comput. 48(177), 203–209 (1987)
Bellare, M., Desai, A., Pointcheval, D., Rogaway, P.: Relations among notions of security for public-key encryption schemes. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 26–45. Springer, Heidelberg (1998). https://doi.org/10.1007/BFb0055718
Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457–473. Springer, Heidelberg (2005). https://doi.org/10.1007/11426639_27
ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 31(4), 469–472 (1985)
Qiu, Q., Tang, Z., Yu, Y.: A decentralized authorization scheme for DRM in P2P file-sharing systems. In: 2011 IEEE Consumer Communications and Networking Conference (CCNC), pp. 136–140. IEEE (2011)
Reinicke, B., Cummings, J., Kleinberg, H.: The right to digital self-defense. IEEE Secur. Priv. 15(4), 68–71 (2017)
Liu, J., Hu, Y.: A New Digital Rights Management Solution Based on White-Box Cryptography. https://eprint.iacr.org. Accessed 21 May 2018
Chen, Y.M., Wu, W.C.: An anonymous DRM scheme for sharing multimedia files in P2P networks. Multimed. Tools Appl. 69(3), 1041–1065 (2014)
Andrychowicz, M., Dziembowski, S., Malinowski, D., Mazurek, Ł.: Fair two-party computations via bitcoin deposits. In: Böhme, R., Brenner, M., Moore, T., Smith, M. (eds.) FC 2014. LNCS, vol. 8438, pp. 105–121. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-662-44774-1_8
Hwang, R.J., Lai, C.H.: Provable fair document exchange protocol with transaction privacy for e-commerce. Symmetry 7(2), 464–487 (2015)
Acknowledge
This work is supported in part by the National Key Research and Development Program of China (No. 2016YFB0800601), the Natural Science Foundation of China (No. 61303217, 61502372), the Natural Science Foundation of Shaanxi province (No. 2013JQ8002, 2014JQ8313).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Wang, D., Gao, J., Yu, H., Li, X. (2018). A Novel Digital Rights Management in P2P Networks Based on Bitcoin System. In: Li, F., Takagi, T., Xu, C., Zhang, X. (eds) Frontiers in Cyber Security. FCS 2018. Communications in Computer and Information Science, vol 879. Springer, Singapore. https://doi.org/10.1007/978-981-13-3095-7_18
Download citation
DOI: https://doi.org/10.1007/978-981-13-3095-7_18
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-3094-0
Online ISBN: 978-981-13-3095-7
eBook Packages: Computer ScienceComputer Science (R0)