A Novel Digital Rights Management in P2P Networks Based on Bitcoin System

In recent years, digital rights management (DRM) in Peer to Peer (P2P) network becomes more and more important. We propose a novel DRM scheme based on P2P to protect valuable digital content. The digital content is firstly encrypted with a symmetric cryptographic algorithm, and then the symmetric key is encrypted by the RSA scheme such that any unpaid user cannot access the digital content. The symmetric key is only held by the content provider for avoiding the risk of the server leaking the symmetric key. By exploiting Bitcoin system, the content provider and the user have the ability to make a direct payment without relying on the server. Moreover, the payment is a timely payment, that is, when the user’s payment is completed, he/she will obtain the private key of RSA immediately. In our scheme, users can download ciphertext of the digital content from any peer who owns the digital content early. In addition, a payment voucher is used to verify users who have paid for the digital content, which can also against the collusion attack. We anonymize the authentication process for protecting the users’ privacy. The security analysis shows that our scheme can provide message confidentiality, anonymity of users, and can resist poisoning attack and collusion attack. The simulation shows that our scheme is efficient and practical.

[1]  Kiyoshi Ueda,et al.  A DRM system suitable for P2P content delivery and the study on its implementation , 2003, 9th Asia-Pacific Conference on Communications (IEEE Cat. No.03EX732).

[2]  Xiaojiang Du,et al.  A novel stochastic-encryption-based P2P Digital Rights Management scheme , 2015, 2015 IEEE International Conference on Communications (ICC).

[3]  Kouichi Sakurai,et al.  A method of digital rights management based on Bitcoin protocol , 2014, ICUIMC '14.

[4]  Thomas Shrimpton,et al.  Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance , 2004, FSE.

[5]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[6]  Jing Feng,et al.  A Novel Digital Rights Management Scheme in P2P Networks , 2010, Commun. Netw..

[7]  Björn Scheuermann,et al.  Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies , 2016, IEEE Communications Surveys & Tutorials.

[8]  Yuxiao Wang,et al.  A Regulation Scheme Based on the Ciphertext-Policy Hierarchical Attribute-Based Encryption in Bitcoin System , 2018, IEEE Access.

[9]  Yi-Ming Chen,et al.  An anonymous DRM scheme for sharing multimedia files in P2P networks , 2012, Multimedia Tools and Applications.

[10]  Marcin Andrychowicz,et al.  Fair Two-Party Computations via Bitcoin Deposits , 2014, Financial Cryptography Workshops.

[11]  Jin Zhang,et al.  A Novel Digital Rights Management Mechanism on Peer-to-Peer Streaming System , 2017 .

[12]  Mihir Bellare,et al.  Relations among Notions of Security for Public-Key Encryption Schemes , 1998, IACR Cryptol. ePrint Arch..

[13]  Bryan Reinicke,et al.  The Right to Digital Self-Defense , 2017, IEEE Security & Privacy.

[14]  N. Koblitz Elliptic curve cryptosystems , 1987 .

[15]  Brent Waters,et al.  Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.

[16]  Christoph Sorge,et al.  Privacy-Preserving DRM for Cloud Computing , 2012, 2012 26th International Conference on Advanced Information Networking and Applications Workshops.

[17]  Zhi Tang,et al.  A decentralized authorization scheme for DRM in P2P file-sharing systems , 2011, 2011 IEEE Consumer Communications and Networking Conference (CCNC).

[18]  Ko Fujimura,et al.  General-purpose Digital Ticket Framework , 1998, USENIX Workshop on Electronic Commerce.

[19]  Yang Liu,et al.  Implementing Digital Right Management in P2P Content Sharing System , 2007, ICA3PP.

[20]  Ren-Junn Hwang,et al.  Provable Fair Document Exchange Protocol with Transaction Privacy for E-Commerce , 2015, Symmetry.

[21]  T. Elgamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.