This report describes a pay broadcasting system for the Internet. This system would enable tens of thousands of people to access an identical video stream simultaneously. In this proposed system, contents are broadcast to all terminals using IP multicast. Contents are encrypted so that legitimate users can decode them with a private key and session keys. As a key management scheme, the Tracing Traitor scheme is adopted because it offers advantages in scalability. The system can also embed digital watermarks, which act as a psychological deterrent to illegal copying and distribution of copyrighted contents. Finally, implementation of an application system is described and efficient broadcasting of contents with this system is demonstrated
[1]
Brad Cain,et al.
Source-Specific Multicast for IP
,
2006,
RFC.
[2]
Deepa Kundur,et al.
Video fingerprinting and encryption principles for digital rights management
,
2004,
Proceedings of the IEEE.
[3]
Moni Naor,et al.
Threshold Traitor Tracing
,
1998,
CRYPTO.
[4]
Hugh Harney,et al.
Group Key Management Protocol (GKMP) Specification
,
1997,
RFC.
[5]
Hugh Harney,et al.
Group Key Management Protocol (GKMP) Architecture
,
1997,
RFC.
[6]
Amos Fiat,et al.
Broadcast Encryption
,
1993,
CRYPTO.