Efficient and Enhanced Solutions for Content Sharing in DRM Systems

  • Michal Davidson
  • Ehud Gudes
  • Tamir Tassa
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8566)


We present a solution to the problem of content sharing in digital rights management (DRM) systems. Users in DRM systems purchase content from content providers and then wish to distribute it between their own devices or to other users. The goal is to allow the sharing of such content, with the control of the content provider, while ensuring that it complies with the content’s usage rules. While most of the previous studies on content sharing in DRM systems assume the existence of authorized domains, ours does not make that assumption. The solutions that we present here are based on Certified Sharing Requests which are used when devices request from the content provider authorization to share content with other devices. Our solutions enhance the usability of DRM, from both the users’ and content provider’s perspective, by supporting on-the-fly sharing, sharing and re-sharing of controlled content, and a pay-per-share business model.


digital rights management content sharing authorized domain proxy re-encryption 


  1. 1.
    Popescu, B.C., Crispo, B., Tanenbaum, A.S., Kamperman, F.: A DRM security architecture for home networks. In: Digital Rights Management Workshop, pp. 1–10 (2004)Google Scholar
  2. 2.
    Ma, G., Pei, Q., Jiang, X., Wang, Y.: A proxy re-encryption based sharing model for DRM. Int’l J. of Digital Content Tech. and its Applications 5(11), 385 (2011)CrossRefGoogle Scholar
  3. 3.
    Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9(1), 1–30 (2006)CrossRefzbMATHGoogle Scholar
  4. 4.
    Abbadi, I.M.: Digital rights management using a master control device. In: Cervesato, I. (ed.) ASIAN 2007. LNCS, vol. 4846, pp. 126–141. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  5. 5.
    Sheppard, N.P., Safavi-Naini, R.: Sharing digital rights with domain licensing. In: The ACM Workshop on Multimedia Content Protection and Security, pp. 3–12 (2006)Google Scholar
  6. 6.
    Sadeghi, A.-R., Wolf, M., Stüble, C., Asokan, N., Ekberg, J.-E.: Enabling fairer digital rights management with trusted computing. In: Garay, J.A., Lenstra, A.K., Mambo, M., Peralta, R. (eds.) ISC 2007. LNCS, vol. 4779, pp. 53–70. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  7. 7.
    Lee, S., Kim, J., Hong, S.J.: Redistributing time-based rights between consumer devices for content sharing in DRM system. Int. J. Inf. Sec. 8(4), 263–273 (2009)CrossRefMathSciNetGoogle Scholar
  8. 8.
    Galbraith, S.D., Harrison, K., Soldera, D.: Implementing the tate pairing. In: Fieker, C., Kohel, D.R. (eds.) ANTS 2002. LNCS, vol. 2369, pp. 324–337. Springer, Heidelberg (2002)CrossRefGoogle Scholar

Copyright information

© IFIP International Federation for Information Processing 2014

Authors and Affiliations

  • Michal Davidson
    • 1
  • Ehud Gudes
    • 2
  • Tamir Tassa
    • 1
  1. 1.The Open UniversityRa’ananaIsrael
  2. 2.Ben-Gurion UniversityBeer-ShevaIsrael

Personalised recommendations