Revocation and Tracing Schemes for Stateless Receivers
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
A survey of peer-to-peer content distribution technologies
ACM Computing Surveys (CSUR)
StarBED and SpringOS: large-scale general purpose network testbed and supporting software
valuetools '06 Proceedings of the 1st international conference on Performance evaluation methodolgies and tools
Secure content access and replication in pure P2P networks
Computer Communications
Protected seamless content delivery in P2P wireless and wired networks
IEEE Wireless Communications - Special issue on seamless content delivery in the future mobile internet
EKM: an efficient key management scheme for large-scale peer-to-peer media streaming
PCM'06 Proceedings of the 7th Pacific Rim conference on Advances in Multimedia Information Processing
Hi-index | 0.00 |
We consider a problem of key leakage in peer-to-peer (P2P) content distribution. In content-distribution services, content is encrypted so that only legitimate users can access the content. Users (peers) cannot be fully trusted in a P2P network because malicious ones might leak their decryption keys. If the redistribution of decryption keys occurs, copyright holders may incur great losses caused by free riders who access content without purchasing it. Therefore, it is essential to solve this problem. In this paper, we propose a P2P content-distribution scheme resilient to the key leakage, and show its feasibility by conducting a large-scale experiment in a real network.