A scheme based on Proof-of-Download blockchain for Digital Rights Management and Traitor Detection
DOI:
https://doi.org/10.5753/jbcs.2026.5568Keywords:
blockchain, consensus, distributed systems, digital rights management, traitor detectionAbstract
The licensing of digital assets is an important aspect of modern markets like music and movies. In this context, Digital Rights Management (DRM) and Traitor Detection (TD) comprise a set of tools, techniques, and processes that try to ensure control of the use of licensed media. This work contributes to this area by making it possible for DRM and TD to happen in a public and highly decentralized blockchain under a proposed threat model by developing new cryptographic techniques, which, as shown by the results obtained, are very efficient without requiring expensive hardware.
Downloads
References
Acar, A., Aksu, H., Uluagac, A. S., and Conti, M. (2018). A survey on homomorphic encryption schemes: Theory and implementation. ACM Computing Surveys (Csur), 51(4):1-35. DOI: 10.1145/3214303.
Aldweesh, A. (2024). The impact of blockchain on digital content distribution: a systematic review. Wireless Networks, 30(2):763-779. DOI: 10.1007/s11276-023-03524-0.
Aumasson, J.-P., Neves, S., Wilcox-O’Hearn, Z., and Winnerlein, C. (2013). Blake2: simpler, smaller, fast as md5. In Applied Cryptography and Network Security: 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings 11, pages 119-135. Springer. DOI: 10.1007/978-3-642-38980-1_8.
Ballesteros Rodríguez, A. (2020). zk-snarks analysis and implementation on ethereum. Available at:[link].
Barker, E. and Kelsey, J. (2015). Nist special publication 800-90a revision 1: Recommendation for random number generation using deterministic random bit generators. NIST, June 2025 SP. DOI: 10.6028/NIST.SP.800-90Ar1.
Belchior, R., Vasconcelos, A., Guerreiro, S., and Correia, M. (2021). A survey on blockchain interoperability: Past, present, and future trends. Acm Computing Surveys (CSUR), 54(8):1-41. DOI: 10.1145/3471140.
Bellare, M. and Micciancio, D. (1997). A new paradigm for collision-free hashing: Incrementality at reduced cost. In International Conference on the Theory and Applications of Cryptographic Techniques, pages 163-192. Springer. DOI: 10.1007/3-540-69053-0_13.
Bendoukha, A. A., Stan, O., Sirdey, R., Quero, N., and Freitas, L. (2022). Practical homomorphic evaluation of block-cipher-based hash functions with applications. In International Symposium on Foundations and Practice of Security, pages 88-103. Springer. DOI: 10.1007/978-3-031-30122-3_6.
Bitcoin Wiki (2021). Hash Time Locked Contracts. Available at:[link] Accessed September 14, 2023.
Buterin, V. et al. (2014). A next-generation smart contract and decentralized application platform. white paper, 3(37):2-1. Available at:[link].
Canetti, R. (2001). Universally composable security: A new paradigm for cryptographic protocols. In Proceedings 42nd IEEE Symposium on Foundations of Computer Science, pages 136-145. IEEE. DOI: 10.1109/SFCS.2001.959888.
Canetti, R., Cohen, A., and Lindell, Y. (2015). A simpler variant of universally composable security for standard multiparty computation. In Advances in Cryptology-CRYPTO 2015: 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part II 35, pages 3-22. Springer. DOI: 10.1007/978-3-662-48000-7_1.
Ciriello, R. F., Torbensen, A. C. G., Hansen, M. R. P., and Müller-Bloch, C. (2023). Blockchain-based digital rights management systems: Design principles for the music industry. Electronic Markets, 33(1):1-21. DOI: 10.1007/s12525-023-00628-5.
Costa, F. Z. D. N., De Queiroz, R. J., Bittencourt, G. P., and Teixeira, L. (2022). Distributed repository for software packages using blockchain. IEEE Access, 10:112502-112514. DOI: 10.1109/ACCESS.2022.3216569.
De León, I. L. and Gupta, R. (2017). The impact of digital innovation and blockchain on the music industry. Inter-American Development Bank.(Nov 2017). Available online: https://publications. iadb. org/en/impact-digital-innovation-and-blockchain-music-industry (accessed on 23 June 2020). Available at:[link].
Gentry, C. (2009). Fully homomorphic encryption using ideal lattices. In Proceedings of the forty-first annual ACM symposium on Theory of computing, pages 169-178. DOI: 10.1145/1536414.1536440.
Go Official Documentation (2025). Go testing package - benchmarks. Available at:[link] Accessed: 2025-05-03.
Grandjean, D., Heimbach, L., and Wattenhofer, R. (2024). Ethereum proof-of-stake consensus layer: Participation and decentralization. In International Conference on Financial Cryptography and Data Security, pages 253-280. Springer. DOI: 10.1007/978-3-031-69231-4_17.
Guelfi, A. R. (2021). Análise de elementos jurídico-tecnológicos que compõem a assinatura digital certificada digitalmente pela Infra-estrutura da Chaves Públicas do Brasil (ICP-Brasil). PhD thesis, Universidade de São Paulo. Avaialble at:[link].
Harkins, D. and Carrel, D. (1998). Rfc2409: The internet key exchange (ike). Available at:[link].
Hhan, M., Yamakawa, T., and Yun, A. (2024). Quantum complexity for discrete logarithms and related problems. In Annual International Cryptology Conference, pages 3-36. Springer. DOI: 10.1007/978-3-031-68391-6_1.
Johnsen, J. A., Karlsen, L. E., and Birkeland, S. S. (2005). Peer-to-peer networking with bittorrent. Department of Telematics, NTNU. Available at:[link].
Kimura, L. T. and Simplicio Junior, M. A. (2023). Amazon biobank: a blockchain-based genomic database for bioeconomyi. Master's thesis, Universidade de São Paulo. Available at:[link].
Ma, Z., Jiang, M., Gao, H., and Wang, Z. (2018). Blockchain for digital rights management. Future Generation Computer Systems, 89:746-764. DOI: 10.1016/j.future.2018.07.029.
Menezes, A. J., Van Oorschot, P. C., and Vanstone, S. A. (2018). Handbook of applied cryptography. CRC press. DOI: 10.1201/9781439821916.
Mishra, A., Obaidat, M. S., and Mishra, D. (2024). Privacy preserving content distribution framework for multidistributor drm systems. Security and Privacy, 7(1):e327. DOI: 10.1002/spy2.327.
Moody, D., Perlner, R., Regenscheid, A., Robinson, A., and Cooper, D. (2024). Transition to post-quantum cryptography standards. DOI: 10.6028/nist.ir.8547.ipd.
Mordor Intelligence (2024). Digital Rights Management Market Size and Share Analysis - Growth Trends and Forecasts (2025 - 2030). Available at:[link] Accessed February 5, 2025.
Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic cash system. Decentralized business review. Available at:[link].
Paverd, A., Martin, A., and Brown, I. (2014). Modelling and automatically analysing privacy properties for honest-but-curious adversaries. Tech. Rep. Available at:[link].
Shang, W. and Yu, Z. (2023). A new media content trusted dissemination architecture based on av-blockchain and chinadrm. Intelligent and Converged Networks, 4(2):142-157. DOI: 10.23919/icn.2023.0015.
Shannon, C. E. (1949). Communication theory of secrecy systems. The Bell system technical journal, 28(4):656-715. DOI: 10.1002/j.1538-7305.1949.tb00928.x.
Siddique, S. S. and Fatima, N. S. (2022). Digital file rights management system using blockchain. Procedia Computer Science, 215:309-320. DOI: 10.1016/j.procs.2022.12.033.
Thanh, T. M. et al. (2024). A proposal of digital contents copyright protection by using blockmarking technique. Computer Science, 25(4). DOI: 10.7494/csci.2024.25.4.5377.
Walker, I., Hewage, C., and Jayal, A. (2022). Provable data possession (pdp) and proofs of retrievability (por) of current big user data. SN Computer Science, 3(1):83. DOI: 10.1007/s42979-021-00968-z.
Wang, G. (2021). Sok: Exploring blockchains interoperability. Cryptology ePrint Archive. DOI: 10.1145/3582882.
Xiao, X., Zhang, Y., Zhu, Y., Hu, P., and Cao, X. (2023). Fingerchain: Copyrighted multi-owner media sharing by introducing asymmetric fingerprinting into blockchain. IEEE Transactions on Network and Service Management, 20(3):2869-2885. DOI: 10.1109/tnsm.2023.3237685.
Xu, J., Wang, C., and Jia, X. (2023). A survey of blockchain consensus protocols. ACM Computing Surveys. DOI: 10.1145/3579845.
Yuan, S., Yang, W., Tian, X., and Tang, W. (2024). A blockchain-based privacy preserving intellectual property authentication method. Symmetry, 16(5):622. DOI: 10.3390/sym16050622.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2026 João Tito do Nascimento Silva, Felipe Z. da N. Costa, João Gondim

This work is licensed under a Creative Commons Attribution 4.0 International License.

