Ensuring Integrity in Online Content Usage and Download Counting with Smart Contracts
- Authors
- Joshi, Shubham; Davidson, Dillon; Lee, Yeonjoon; Cho, Homook; Son, Junggab
- Issue Date
- Sep-2025
- Publisher
- Springer Science and Business Media Deutschland GmbH
- Keywords
- Content Sharing; Download Counting; Elliptic Curve Cryptography; Integrity; Interactive Smart Contract; Proxy Re-Encryption
- Citation
- Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, v.629 LNICST, pp 274 - 296
- Pages
- 23
- Indexed
- SCOPUS
- Journal Title
- Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
- Volume
- 629 LNICST
- Start Page
- 274
- End Page
- 296
- URI
- https://scholarworks.bwise.kr/erica/handle/2021.sw.erica/126587
- DOI
- 10.1007/978-3-031-94455-0_13
- ISSN
- 1867-8211
1867-822X
- Abstract
- In the fast-paced digital world, creating and distributing content has become easier with the rise of the Internet. However, content distribution faces challenges in ensuring integrity and accuracy in tracking consumption or downloads. Current centralized systems lack transparency and are vulnerable to breaches, raising concerns for both content owners and service providers. To address these issues, we propose a solution that leverages smart contracts to ensure tamper-proof tracking of content consumption. Our system comprises two secure smart contracts: an Elliptic Curve Cryptography based Proxy Re-encryption smart contract (ECC-PRE-SC) and a Counting smart contract (Count-SC). The ECC-PRE-SC handles the re-encryption process, while the Count-SC maintains a tamper-proof count of content downloads. Content owners deploy the ECC-PRE-SC smart contract and embed the list of service providers’ wallet addresses and encrypted content key, followed by the deployment of the Count-SC smart contract. It ensures only authorized access and prevents tampering of consumption counts, addressing the challenge of lack of trust between service providers and content owners. Security analysis proves the system’s resilience against defined threats, and implementation on an Ethereum private testnet demonstrates its feasibility. Our research aims to enhance trust and transparency in content distribution, benefiting content creators, service providers, and users.
- Files in This Item
- There are no files associated with this item.
- Appears in
Collections - COLLEGE OF COMPUTING > ERICA 컴퓨터학부 > 1. Journal Articles

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.