Abstract
The growth of the Internet has created an electronic marketplace for digital goods, such as mp3, software, etc., and peer-to-peer(P2P) networks for distribution and sharing of files have enjoyed enormous popularity in recent. However, there is an essential problem related with trustiness and reliability in P2P, where untrustworthy parties may participate in financial transactions. One general solution to this problem is distributing the encrypted version of digital content so that a legitimate user can get the decryption key from key issuing server. In this paper, we propose a new approach to key issuing for designing a secure content distribution system. Each user can recovery the original digital content from the encrypted version of it by purchasing decryption key from key issuing server. However, instead of generating a random key, the key used for content encryption and decryption can be directly derived from the usage rules or transaction terms in our system. This approach allows to separate content encrypter and key issuer, and then it also enables to remove the need of secure key transfer between content provider and key issuing server in secure content distribution system.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Milojicic, D.S., Kalogeraki, V., Lukose, R., Nagaraja, K., Pruyne, J., Richard, B., Rollins, S., Xu, Z.: Peer to Peer Computing, HP Laboratories Palo Alto HPL-2002-57 (March 2002)
Lee, J., Hwang, S., Jeong, S., Yoon, K., Park, C., Ryu, J.: A DRM Framework for Distributing Digital Contents through the Internet. ETRI Journal 25(6) (December 2003)
Horne, B., Pinkas, B., Sander, T.: Escrow Service and Incentives in Peer-to-Peer Networks. In: Proceedings of the 3rd ACM conference on Electronic Commerce, pp. 85–94 (October 2001)
Market Management of Peer to Peer Services, http://www.mmapps.org
Hanaoka, G., Ogawa, K., Murota, I., Ohtake, G., Manima, K., Oyamada, K., Gohshi, S., Namba, S., Imai, H.: Separating Encryption and Key Issuance in Digital Rights Management Systems. In: Safavi-Naini, R., Seberry, J. (eds.) ACISP 2003. LNCS, vol. 2727, pp. 365–376. Springer, Heidelberg (2003)
Watanabe, Y., Numao, M.: Conditional Cryptographic Delegation for P2P Data Sharing. In: Chan, A.H., Gligor, V.D. (eds.) ISC 2002. LNCS, vol. 2433, pp. 309–321. Springer, Heidelberg (2002)
The Advanced Encryption Standard, FIPS-197, http://csrc.nist.gov/CryptoToolkit/aes/
Secure Socket Layer, http://wp.netscape.com/eng/ssl3/
Boneh, D., Lynn, B., Shacham, H.: Short Signatures from the Weil Pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 514–532. Springer, Heidelberg (2001)
Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)
Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of applied cryptography. CRC press, Boca Raton (1997)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Park, Y., Shin, JH., Rhee, KH. (2006). Design of a Secure Digital Contents Delivery System in P2P Networks. In: Safavi-Naini, R., Yung, M. (eds) Digital Rights Management. Technologies, Issues, Challenges and Systems. DRMTICS 2005. Lecture Notes in Computer Science, vol 3919. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11787952_23
Download citation
DOI: https://doi.org/10.1007/11787952_23
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-35998-2
Online ISBN: 978-3-540-35999-9
eBook Packages: Computer ScienceComputer Science (R0)