Abstract
As P2P technique is broadly used for content distribution today, copyright infringement becomes a big problem. Thus we propose a DRM scheme over P2P network by establishing an access control mechanism for shared digital content. Compared with the traditional PKI, broadcast encryption is considered as more suitable for constructing P2P DRM system. But the existence of a central license server would not only cause single point of failure but also bring bottleneck problem. In this paper, we describe a basic implementation of broadcast encryption-based P2P DRM system first. Then we present a general scheme with focus on how to decentralize the license agency to reserve the flexibility of P2P network. At last we analyze its security, evaluate its efficiency and point out a tradeoff between the two system parameters.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Subramanya, S.R., Yi, B.K.: Digital rights management. Potentials. IEEE 25(2), 31–34 (2006)
Berkovits, S.: How To Broadcast A Secret. In: Barahona, P., Porto, A., Moniz Pereira, L. (eds.) EPIA 1991. LNCS, vol. 541, pp. 535–541. Springer, Heidelberg (1991)
Fiat, A., Naor, M.: Broadcast Encryption. In: Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology, pp. 480–491 (1994)
Naor, M., Pinkas, B.: Efficient Trace and Revoke Schemes. In: Proceedings of the 4th International Conference on Financial Cryptography, pp. 1–20 (2000)
Naor, D., Naor, M., Lotspiech, J.: Revocation and Tracing Schemes for Stateless Receivers. In: Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology, pp. 41–62 (2001)
Halevy, D., Shamir, A.: The LSD Broadcast Encryption Scheme. In: Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology, pp. 47–61 (2002)
Dodis, Y., Fazio, N.: Public Key Broadcast Encryption for Stateless Receivers. In: Feigenbaum, J. (ed.) DRM 2002. LNCS, vol. 2696, pp. 61–80. Springer, Heidelberg (2003)
Boneh, D., Gentry, C., Waters, B.: Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 258–275. Springer, Heidelberg (2005)
Lotspiech, J., Nusser, S., Pestoni, F.: Broadcast Encryption’s Bright Future. Computer 35(8), 57–63 (2002)
Lotspiech, J., Nusser, S., Pestoni, F.: Anonymous Trust: Digital Rights Management Using Broadcast Encryption. Proceedings of the IEEE 92(6), 898–909 (2004)
Wallner, D.M., Harder, E.J., Agee, R.C.: Key management for multicast: Issues and architectures. RFC2627(informational) (1999)
Wong, C.K., Gouda, M., Lam, S.: Secure group communications using key graghs. In: SIGCOMM1998, pp. 68–79. ACM Press, New York (1998)
Pestoni, F., Lotspiech, J., Nusser, S.: xCP: Peer-to-Peer Content Protection. IEEE Signal Processing Magazine 21(2), 71–81 (2004)
Zhang, Y., Yuan, C., Zhong, Y.: Implementing DRM over Peer-to-Peer Networks with Broadcast Encryption. In: Ip, H.H.-S., Au, O.C., Leung, H., Sun, M.-T., Ma, W.-Y., Hu, S.-M. (eds.) PCM 2007. LNCS, vol. 4810, pp. 236–245. Springer, Heidelberg (2007)
Maymounkov, P., Mazières, D.: Kademlia: A Peer-to-peer Information System Based on the XOR Metric. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 53–65. Springer, Heidelberg (2002)
Kumar, V.: Trust and Security in Peer-to-Peer System. In: Proceedings of the 17th International Conference on Database and Expert Systems Applications, pp. 703–707 (2006)
Luo, X., Qin, Z., Geng, J., Wu, C.: P2PFAIR: Fair Exchange in P2P Sharing System without Dedicated TTP. Communications and Networking in China, 1–5 (2006)
Menezes, A., van Oorshchot, P., Vanstone, S.: Handbook of Applied Cryptographic. CRC Press, Boca Raton (1996)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Liu, L., Yuan, C. (2009). Broadcast Encryption-Based P2P DRM without Central License Server . In: Muneesawang, P., Wu, F., Kumazawa, I., Roeksabutr, A., Liao, M., Tang, X. (eds) Advances in Multimedia Information Processing - PCM 2009. PCM 2009. Lecture Notes in Computer Science, vol 5879. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-10467-1_39
Download citation
DOI: https://doi.org/10.1007/978-3-642-10467-1_39
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-10466-4
Online ISBN: 978-3-642-10467-1
eBook Packages: Computer ScienceComputer Science (R0)