Blockchain-Based Smart Propertization of Digital Content for Intellectual Rights Protection

: Several platform companies have been successful in competing with digital piracy by producing consumer-friendly services. Nowadays, however, the digital content service market has become more monopolized than ever, which forms barriers to the entry of new platform companies. The platform monopoly would cause considerable problems both to content providers and consumers as it limits the choice of consumers. To remove the platform monopoly in digital content markets, we propose a public blockchain-based digital content service method. The proposed method encrypts the digital content to a self-decryptable form, which we call Smart Propertized Digital Content (SPDC), and utilizes the decentralization and traceability of the public blockchain to provide a non-monopolistic ecosystem for the management and distribution of the SPDC license. The proposed method can be more beneﬁcial both to content creators and users than the current winner-takes-all platform model. For instance, users can download SPDC once and play many times without requesting the decryption key, and SPDC owners can make SPDC licenses to be time-limited, device-limited, resellable, or terminated without resorting to help from other intermediaries. We conducted the threat analysis on the proposed method by examining possible attacks in various scenarios. Based on threat analysis, we conclude that the proposed method can provide a new type of digital content service ecosystem that can be operated in a completely decentralized way and neutrally beneﬁcial to all participants.


Introduction
The rapid development of information communication technologies (ICTs) in storing, managing, searching, and transmitting digital data has changed how people consume content such as book, music, video, and continues doing so. As of the year 2021, a great portion of content is now being stored in digital format and distributed and sold to users via the Internet, and digital data-specific services such as subscription-based streaming have become ever more popular. For instance, the International Federation of the Phonographic Industry (IFPI) 2019 annual report showed that global recorded music revenues posted growth of 8.2%, which was the fifth consecutive year of global growth, and the digital streaming revenue alone accounted for 56.1% of the global recorded music market after increasing by 22.9% in 2019 [1]. The report from Grand View Report also showed that the global digital video streaming market size was valued at USD 42.6 billion in 2019 and is projected to grow at a compound annual growth rate of 20.4% from 2020 to 2027 [2].

Problem Statement
As compared with analog content, digital content is easy to manage and suitable for massive distribution. Such advantages of digital content, however, become disadvantages in the presence of digital piracy. Digital content can be copied identically to original versions and massively distributed to potential content consumers freely through the Internet. Most people are unlikely to pay for digital content that can be downloaded from the Internet or copied from one device to another. This has been a major problem for content industries such as the music, movie, and publishing industries. It has been a common belief that without legal and technological protection against digital piracy, content sales revenues will plummet, content creators will consequently not receive royalties and hesitate to make new content. Consequently, the content industries can be in jeopardy, and consumers will eventually suffer from the lack of high-quality content. Some research works [3][4][5] challenged this by claiming that the elimination of digital piracy would not transform illegal users to the content buyers substantially. They also claimed that digital piracy gives some 'positive effects' (e.g., an effective promotion and publicity vehicle, et cetera) to consumers and artists. The majority of research works, however, support the common belief [6][7][8][9][10][11][12][13].
To protect digital content against digital piracy, content industries have adopted various forms of the 'digital rights management' system (DRM). The DRM technology allows the content provider to restrict consumers to playing digital content under specific rules (such as on a streaming service only, a limited number of plays, or specified devices, et cetera). The DRM technology has contributed to the development of digital content services by alleviating widespread fear of digital piracy. Some consumers, however, criticize DRM for restricting their content usage under consumer-unfriendly rules.
Several platform companies have been successful in competing with digital piracy. Examples include the ebook service employed by Amazon and Barnes and Nobles, the Apple iTunes' music download service, the music streaming by Spotify, and the video streaming by Netflix, et cetera. Those platform companies do not impose powerful DRM technologies to fight against digital piracy (but their DRM methods are strong enough to keep most consumers from attempting to make illegal content copies) but give consumer-friendly platform services to honest consumers. They vigorously use consumer data and the scale of economies to attract more consumers. Such efforts mean that digital content markets are dominated by few platforms nowadays. This phenomenon is often called the natural monopoly in digital content markets.

Key Contributions
To remove the natural monopoly in digital content markets, we propose a public blockchain-based digital content service method. To be specific, we use the decentralization and traceability of the public blockchain to provide a non-monopolistic content service ecosystem. In particular, contributions of the proposed digital content service model are as follows: • The license management and payment collection of digital content can be performed in decentralized public blockchain networks. There have been two opposite opinions on the platform monopoly in digital content markets. One opinion is that the market dominance by few platforms is a temporary phenomenon, and the seeming monopolies in current digital content markets will disappear once markets are mature. The other opinion is that the platform monopoly is a present danger in digital content markets and will cause serious problems not only to content providers but also to consumers, unless proper antitrust regulations and technical improvements are introduced. This study is based on the latter opinion. Specific issues that motivate this study are as follows: • Platform monopoly: Platform companies massively collect user data in the process of distributing digital content and use collected data vigorously in personalized content marketing. While the user data-driven personalized marketing can benefit users, it can also introduce switching costs for users. The more the platform company learns about its users' preferences, the more accurately it can market content based on their specific preferences. It makes a formidable barrier to entry for new platform companies since they do not have the user data necessary to compete with the dominant platform company. Platform companies also limit purchased content to their ecosystem by employing the DRM system. In such a case, users would prefer to have all their digital content on a single platform rather than spread it out on many platforms. It makes another formidable barrier to entry for new platform companies. It also makes it difficult for users to switch to other platforms since they want to continue to use purchased digital content. This is called the 'platform lock-in' effect [14]. Based on these arguments, there has been the warning (e.g., see [15]) that digital content platform markets tend to be naturally monopolized. • Dilemmas of content creators: Digital content platforms have benefited content creators by providing new kinds of distribution channels. With these channels, creators can distribute and advertise their content to customers without using the channels provided by content companies, which often demand a high price. The natural monopoly in content platform markets, however, has introduced significant risk to content creators. Nowadays, it is not unusual to hear complaints of content creators about platforms, for taking too large a portion of revenues or not giving clear log information which determines the revenue share of content creators. As individual sellers, content creators are more vulnerable than content companies to predatory business practices performed by platforms. • Dilemmas of content users: In the initial days, platforms rapidly gained user acceptance by providing digital content, with low prices and data-driven personalized services. Such benevolence given by platforms is brought to users not only by technological improvement but also by sacrifices in content companies and creators. Those sacrifices will make content companies and creators hesitate to make high-quality digital content and hence will eventually harm users.

Related Works
There have been several approaches that use blockchain technology in protecting intellectual rights management or providing new ecosystems for digital content services. Examples are as follows: • Ujo music [16] uses the Ethereum blockchain technology [17] to keep track records of digital content owners and assign a unique identity to each uploaded music. The payment process in Ujo music is carried out by Ethereum smart contracts. In Ujo music, however, digital content is not protected against illegal copying. • Resonate music [18] provides subscription-based music streaming services and uses blockchain technology to make digital music owners take participate in publishing their music and managing royalties on them. • The platform proposed by SingularDTV [19], which describes itself to be a decentralized 'Netflix' on Ethereum, is somewhat similar to the proposed method of this paper. The difference is in the fact the SingularDTV platform is designed to charge for each streaming, while the proposed method of this paper allows digital content owners to charge as they wish. For instance, they can demand the payment for each watch, a fixed rate for a limited number of views or a limited period, et cetera. It is also true that the proposed platform of this paper is not restricted to streaming services, unlike SingularDTV.
• Methods proposed in [20,21] are also quite similar to the proposed method of this paper. The method in [20] is designed to identify malicious users, with the hope that this kind of identification might discourage attempts at malicious activity from users. On the other hand, the method in [21], however, allows the user to access the digital content decryption key. In other words, the user can perform the duplication of decrypted digital content. This is not good. This kind of scenario is not allowed in our method. • Methods in [22][23][24][25] proposed to store the digital watermark of contents in blockchain to implement copyright registration. For instance, the method in [22] proposed a watermarking-based multimedia blockchain framework to provide a trusted mechanism to retrieve the transaction trails or the modification histories on digital content. The study in [23] proposed an artwork image DRM for Internet misusing detection. The method in [24] combined digital watermarking, blockchain, perceptual hash function, quick response code, and InterPlanetary File System (IPFS) for copyright management. Among them, blockchain was used to securely store watermark information and provide timestamp authentication for multiple watermarks to confirm the creation order. The method in [25] used digital fingerprint technology, an Inter-planetary File System (IPFS), and blockchain technology to create a digital system to optimize traditional processes and improve the efficiency of digital media copyright solidification. • Methods in [26][27][28][29][30][31] used the blockchain for secure data sharing. For instance, the method in [26] proposed a privacy-preserving DRM system. The method in [27] proposed a data sharing protocol over different DRM systems. The study in [28] proposed a blockchain-based system to implement a superdistribution-based ideal content distribution system. The methods in [29] used blockchain technology to enable the user to have full control over their multimedia files such as storing, querying, sharing, and auditing data. The study in [30] proposed a blockchain-enabled DRM system to share and manage multimedia resources of online education, while the method in [31] used blockchain technology to share and reuse scholars' datasets securely. • Methods in [32][33][34][35] proposed blockchain-based DRM systems for various content types for secure data sharing. To be specific, the study in [32] used digital watermarking and a scalable blockchain model. The study in [33] proposed a blockchainbased solution for the identification, attribution, and payment for digital work. The study in [34] proposed an integrated trading system, to provide a transparent privacy-preserving, and tamper-proof transaction history for registration, provenance, and traceability of art assets. The method in [35] proposed a blockchain-based scheme for digital rights management, to provide trusted and high-level credible content protection and conditional traceability of violation content service. • There were several hybrid blockchain-based approaches for the copyright protection of digital content. The method in [36] proposed a new zero watermarking construction method based on the angular features of vector data that store the zero watermarking and copyright information on the blockchain. The study in [37] explained blockchain and tangle technologies, along with an extended application to the copyright protection of digital content. The study in [38] proposed multi-authority attribute-based encryption (MA-ABE) schemes to make a relevant user obtain the final decryption attribute key only after all attribute authorities have issued their keys to the blockchain publicly.
One of the main differences between the described examples and our method is in the way how the proposed blockchain is used. To be specific, those described examples use blockchain as a database to record ownership or identity of digital content or as a payment collecting system. Their blockchains, however, are not the main reason for the prevention the illegal copying of digital content. For example, in [19] the illegal copying of digital content can be suppressed not by blockchain but by the streaming service. Similarly, in [22][23][24][25] blockchains do not prevent illegal copying, but the possibility of legal accusation with a watermark as proof of illegal use does. On the other hand, our method uses the blockchain as a virtual machine to determine which digital content can be used by whom and how. In other words, in our method, the blockchain itself makes illegal copying of digital content useless.

Proposed Method
The proposed method uses a blockchain system to allow digital content creators to directly control the whole procedure of content distribution. To do so, the proposed method encrypts digital content to a self-decryptable form and makes the content player follows the use condition recorded in the system of blockchains.
The proposed ecosystem consists of the following three components: The proposed method of this paper transforms the digital content to SPDC which can be self-decryptable and playable only by the MP with the HMBS. To be specific, the HMBS stores the license information of SPDC, the MP sends a signal to the SPDC according to license information of the SPDC in the HMBS (here the term 'license' is used to specifically mean 'the right to play a specific SPDC'), and SPDC continues to play or stops the selfdecryption based on the received signal from the MP.
The HMBS itself consists of AC (accountchain), MC (mainchain), and multiple pairs of SC (sidechain) and dSC (dual sidechain). Roughly speaking, the proposed method encapsulates the digital content in SPDC, and defines the MP to follow the SPDC license rule recorded in the AC, and provides the integrity of AC by using SCs, dSCs, and MC.
This section is outlined as follows. In Section 3.1 we shall explain how SPDC is formed. In Section 3.2 we shall explain the structure of the HMBS, which consists of MC, AC, multiple SCs and dSCs. Finally, in Section 3.3 we shall explain how the SPDC license is bought, transferred, or terminated through the HMBS.
In this study, we shall use the following abbreviations in Table 1. In this study, we shall assume that entities listed in Table 2 participate in the HMBS: In Table 2, the SPDC storage provider D is not confined to rules defined by the HMBS and can be any ordinary data storage provider on the Internet. In other words, we assume that SPDC (the self-decryptable encrypted version of digital content) itself is freely available to anyone through the Internet.

Smart Propertized Digital Content
Let m be a digital content to be protected under the HMBS, and P be the owner of m. To protect m from the illegal copying, the proposed method makes P take the following step: where c is the encrypted data by a symmetric encryption function E (for example, Advanced Encryption Standard (AES) [39]) with a secret key K. In (1), P is included to indicate that P performs the encryption process of computing c from m and K. The secret key K is randomly selected by P and used as input in the encryption process. A standard form of many DRM systems sells digital content in an encrypted format (for, e.g., c in (1)) and controls secret keys (for, e.g., K in (1)) to be used only by content users without disclosing them to anyone, including content users. A weak point of this approach is the fact that it is not easy to hide secret keys from content users who need them for their legitimate use. Many approaches have been proposed to solve this dilemma. One of them is the streaming service, which allows only a small portion of digital content to be available to users and hence does not need to provide whole encrypted digital content and corresponding secret keys to users. The streaming technology is, however, not perfect in removing digital piracy, just as in any DRM technology ever introduced so far.
To deal with the weak point in secret key transfer from the content owner P to the user U, the proposed method makes P compute a secret key embedded decryption function D K by replacing many computation parts of the decryption with transformation by randomized lookup tables (it is an example of white-box cryptography technologies [40,41]) and by implementing reverse engineering resilient obfuscated codes [42]. The process of making D K is described as follows: where r 1 is a random number chosen by P to secretly hide K in D K . The proposed method puts the encrypted digital content c, the decryption function D K , and a control program which initiates the use of D K on c only under predetermined conditions in one package. This control program is called the 'immobilizer' and denoted by IM from now on. The package formed by c, D K , and IM is called 'smart propertized digital content' (SPDC) of m. The process of making SPDC s is described as follows: where r 2 is a random number chosen by P to make it infeasible to distinguish c, D K , and IM in s. The computation of SPDC s of a digital content m can be carried out consecutively: where SP is the program that performs computations in (1)-(3) consecutively. The content owner P of the digital content m will use SP to make SPDC s of m by selecting K, r 1 , r 2 randomly. The proposed method does not require P to store K, r 1 , r 2 . Those random numbers are disposable once they are used. Figure 1 illustrates a SPDC s (the one that has c, IM, and D K ), where m i is a decrypted bitstream by D K . It illustrates that IM controls the decryption of s by communicating only with MP.  (1), IM is the immobilizer, D K is the key hidden decryption function (2), and m i is a decrypted bitstream by D K .

Hierarchical Multi-Blockchain System
As mentioned earlier, the HMBS itself consists of AC (accountchain), MC (mainchain), and multiple pairs of SC (sidechain) and dSC (dual sidechain). The main role of each blockchain is summarized as follows: • MC records underlying cryptocurrency (we shall call it 'HMBS coin') transfer transactions and controls the initiation and connection of 'segment' (we shall explain it in Section 3.2.3) of multiple SCs and dSCs. • AC records the SPDC license use condition to determine who can play SPDC and how. • SC and dSC validate the creation, transfer, and termination of the SPDC license.
The proposed method uses HMBS coins recorded in MC only. In other words, the proposed method regards transactions in SC or dSC segments as valid only after they are connected to MC. Figure 2 illustrates components of the HMBS. The block chaining process in MC controls the initiation and connection of multiple SC and dSC segments. AC expands its blocks independently from MC. MC with the order index n (n = 0, 1, · · · ), the MC block by B [n] , and the updated MC by MC [n] . This process can be described as follows: when the MC epoch R where the notation '||' is the concatenation. We shall explain the mining process of MC in the following setting: The current MC MC , a miner collects transactions t with a nonce r [n] which satisfies (6).

Accountchain
After the content owner P transforms their digital content m to SPDC s as described in Section 3.1, they request the creation of the account of s to the AC network. Table 3 shows a list of information stored in the account of SPDC s. In Table 3, H(s), the hash value of SPDC s, can be used as an identification number of s. The public key pk(P) of P defines the owner of s and the license fee receiving address in MC. In this work, we assume that the user must play s under a certain rule. The notation R s in Table 3 represents that certain rule. The owner P of s must determine what rules are to be imposed on the use of s and write them in R s as readable codes by smart contracts of the HMBS. Examples of usage rules include the maximum number of plays, the maximum number of devices, the time duration to play, the transferability of license (a user can resell his license to other users), et cetera. The set Z s in Table 3 contains so-called 'registration keys'. These keys are used as the user identity in purchasing the license of SPDC s. Detailed explanation will be given in Section 3.3.1.
When the account of s is created for the first time, the target value w in Table 3 is computed by where H λ is the first λ-bit truncation of the SHA-256 hash function H, where 1 ≤ λ ≤ 256, and 0 · · · 0 is the all zero bitstream of length 512 bits. The input value q in Table 3 is a bitstream of length 256 bits designed to make holds for each non-empty registration key set Z s . In other words, q is said to be the input value of Z s for s if and only if q satisfies (9). The parameter λ in (9) determines how difficult the computation of the input value q is. For some λ, say λ ≈ 70, finding an input value q for a given non-empty set Z s would be a very difficult task, but it can be done with collective computation, as shown in block mining in Bitcoin. Each element of the registration key set has the following form: τ = the registration key : hash value h, where h is the hash value of the SC block containing the transaction that requests the inclusion of τ in (10) to Z s . The inclusion of h in (10) is designed not to have head start in computing the input value q. More detailed explanation will be given in Section 3.3.3. The proposed method uses AC, which has a modifiable blockchain structure [46], to record SPDC account information in Table 3. The modifiability of AC is used to efficiently record frequently changing account information, for example, Z s . Just as in MC, we assume that the AC network appends a new block to AC every certain time on average, and define terms 'AC block period', 'AC epoch', and 'AC block' accordingly. We also denote AC epoch by R

[n]
AC with the order index n (n = 0, 1, · · · ), AC block by A [n] , and AC at the moment when A [n] is connected to AC by AC [n] .
The AC block records the information of multiple accounts.
with a nonce ρ [n] which satisfies (12). The modifiability of AC comes from (11). Suppose that we want to modify Z s toZ s to respond to a new license purchase of SPDC s. If we can find q that satisfies (9) with Z s in the place of Z s , then we can replace Z s withZ s in the account of SPDC s without destroying the chaining structure (imposed by (13)) in AC.
When an AC block is mined, all accounts in it are assumed to be created for the first time. The proposed method uses a separate cryptocurrency for AC. The AC-specific cryptocurrency will be used for the AC block reward and SPDC account creation request fee. It is also possible that the AC-specific cryptocurrency can be designed to be exchangeable with the HMBS coin at a fixed rate.

Sidechain and Dual Sidechain
The proposed method uses multiple pairs of SC (sidechain) and dSC (dual sidechain) to validate the creation, transfer, and termination of the SPDC license. We assume that there is a predetermined rule assigning each SPDC license to be validated through only one SC and dSC pair. Let us use the notation S σ to indicate one of the SCs with σ as an SC identifier. In the proposed method, each SC S σ consists of a series of 'segments', and each segment consists of 'SC blocks'. We denote the n-th segment of S σ by S  σ of S σ . Let us also assume that B [n i+1 ] is the next MC block that initiates the next segment S be SC blocks mined in the S σ SC network during the time interval that h [n i ] to h [n i+1 ] are computed in the MC network.
In the proposed method, each SC must have its dual dSC. Let us use the notation S σ to indicate the dSC corresponding to S σ . Just like S σ , each dSC consists of a series of 'segments', and each segment consists of 'dSC blocks'. We denote the n-th segment ofŜ σ byŜ [n] σ , and the j-th dSC block of the segmentŜ where c [σ,n,i] is the number transactions to be included in b with a nonce r [σ,n,i] which satisfies (16). The block chaining structure of the dSC segment is almost identical to that of the SC segment. One difference is that the dSC block records only one 'smart contract', while the SC block records multiple transactions. Detailed explanation will be given in Section 3. 3 where h σ , respectively.

Creation, Transfer, and Termination of SPDC License
In this section, we shall explain how the SPDC license is created, transferred, and terminated through the HMBS.

Registration Key
We use the term 'registration key' to refer to a public key associated with a fixed amount of HMBS coins. The proposed method uses the registration key as the SPDC license user identity. The fixed amount of HMBS coins assigned to the registration key is called 'registration fee'. For simplicity of presentation, we assume that the registration key itself is 'registered' to make users not transfer HMBS coins to it. We also assume that the registration fee can be spent just like any other HMBS coins.
The proposed method follows the UTXO (Unspent Transaction Output) model of Bitcoin in recording transactions related to HMBS coin transfer. In such a case, the 'address' (the hash value of the public key), instead of the public key itself, is used as the identity of the payer or the receiver. In this paper, however, we shall ignore the described difference in the public key and the address for simplicity of presentation.

SPDC License
We shall use following notations to represent descriptions written on the right hand sides: (U: a user) rk(U) = a registration key of U, rk(U) = the private key paired with rk(U), L s = the license of SPDC s, Λ L s ,rk = the creation of L s assigned to rk, Λ * L s ,rk,rk = the transfer of L s to rk from rk, and Λ L s ,rk = the termination of L s assigned to rk.
Let us consider the case when a user U tries to buy L s from an owner P of s by using his registration key rk(U). To fulfill this, the proposed method makes U to request the following transaction t is to be recorded in one of the SCs, say, S σ SC: t: pk(U) pays C to pk(P) for Λ L s ,rk(U) , signed by sk(U), where C is the price for L s . The proposed method uses the recording of t in S σ SC as a necessary condition for the change in the SPDC account that allows the user U to play s. Let us consider another case when a user V tries to resell the SPDC license L s assigned to his registration key rk(V) to another user W by reassigning L s to rk(W), a registration key of W. Here we assume that P, the owner of s, made L s transferable when they made s from the beginning. They can specify rules for when to create, transfer, or terminate SPDC license of s in the license rule R s in Table 3.
To fulfill the transfer of L s between users V and W, the proposed method makes V and W request the following transaction t * to be recorded in S σ SC: t * : pk(W) pays C * to pk(V) for Λ * L s ,rk(V),rk(W) , signed by sk(W) and sk(V), (27) where C * is the price to be paid by W to V as the license transfer fee. Here we note that S σ SC must be the same SC where the transaction that generates Λ L s ,rk(V) was recorded. The proposed method uses the recording of t * in S σ -SC as a necessary condition to change the SPDC account of s so that W is allowed to to play s, while V cannot play s any longer. Finally, we consider the case where an HMBS participant, including the owner P of s, tries to terminate the SPDC license L s assigned to a registration key rk(Y) of a user Y, due to license misuse. Various misuses can cause the termination of the SPDC license. Among them, we shall consider the registration key sharing case here. In the proposed method, to play s, Y needs the private key rk(Y) paired with the registration key rk(Y) (see Section 3.3.4). Therefore, if Y discloses rk(Y) to another user, say, Y , then Y can play s without paying the license fee to P, the owner of s. At the same time, Y can spend the registration fee assigned to rk(Y). Such a spending is easily detectable in the proposed HMBS. To punish this type of license misuse, anyone who finds the registration key sharing can request the termination of rk(Y) by submitting the following transaction t to the S σ SC network: where the 'evidence' is the location of the transaction that spent the registration fee assigned to rk(Y). Here we also note that S σ SC must be the same SC where the transaction that generates Λ L s ,rk(V) was recorded.
Notice that the user Y , by knowing rk(Y), can play not only s but also any SPDCs whose licenses are assigned to rk(Y). Thus, the termination of rk(Y) must be requested for all SPDCs whose licenses are assigned to rk(Y). However, it might require a large number of registration key sets to be changed. As explained in Section 3.2.2, it would be extremely difficult, if not impossible, to find inputs values q's in (9) for a large number of registration key set changes. Considering this fact, the proposed method makes one transaction produce one request of terminating rk(Y) in each SPDC license L s . The termination of rk(Y) in other SPDCs whose licenses are assigned to rk(Y) can be completed as time progresses.

Smart Contracts in Dual Sidechains
Without loss of generality, we now assume that transactions t in (26), t * in (27), and t in (28) are recorded in the i-th S σ block b σ is connected to B [n i+1 ] in MC, but requests of changing ownership of L s as in t, t * , and t are not completed yet. To be specific, the transaction t in (26) demands the inclusion of rk(U) in Z s in Table 3 so that MP of U gives the 'continueto-play' signal to IM (immobilizer) of s after verifying that U has rk(U), the private key paired with the registration key rk(U). In other word, rk(U) is not yet included in Z s which determines who can play s. Similarly, the transaction t * in (27) demands the inclusion of rk(W) and the exclusion of rk(V) in Z s , and the transaction t in (28) demands the exclusion of rk(Y) from Z s . Those requests are not completed yet.
Considering frequent license change requests, the immediate response to each request is not efficient. To efficiently satisfy license change (e.g., creation, transfer, and termination) σ , the proposed method uses the dSC-segmentŜ immediately after the SC segment S where Z s and Z s are registration key sets for s before and after license change requests in σ are applied, respectively, and q is the bitstream that satisfies (9) with Z s , i.e., w = H λ (H(s)||pk(P)||q ||H(Z s )).
The miner who finds q first tries to connect the dSC blockb is connected to MC. To be specific, in the account of SPDC s in AC, the registration key set Z s and the input value q are replaced with Z s and q , respectively. Figure 3 illustrates how the SPDC license change request is executed.

Manager Program
The proposed method makes the MP (manager program) communicate with the IM (immobilizer) of SPDCs and use SPDC accounts in AC to determine who can play SPDCs. To explain this, let us consider the case when a user U uses the MP to play SPDC s. The user U does not need to pay the license fee for downloading s, since the downloading itself does not make s playable. At the moment when U plays s, The MP gives the 'continue-to-play' command to the IM inside the SPDC s if U can provide a correct response which can be made only by using the private key paired with one of the registration keys Z s of s, and the 'stop' command to the IM of s, otherwise. Thus, to play s, U needs to pay the license fee by requesting the transaction t (26) be recorded in SC. It leads to the inclusion of a registration key rk(U) of U in Z s of s. After this, U can play s by proving the ownership of the private key paired with rk(U) to the MP, without revealing the private key itself.

Discussion
In this section, we shall discuss the results of thought experiments on possible attacks on the proposed method. In this thought experiment, we assume that the license L s of SPDC s is assigned to a registration key rk(U) of a user U.
Unauthorized SPDC license sharing: Suppose that U wants to share L s with many anonymous Internet users. As mentioned in Section 3.3.2, the sharing of the SPDC license needs the sharing of the private key rk(U) paired with rk(U). In this case, any users who know rk(U) can spend the registration fee assigned to rk(U). Such action is easily detectable in the HMBS. It would lead to the termination of all SPDC licenses assigned to rk(U). This scenario indicates that the attempt to perform Internet-wide license sharing would be strongly suppressed.
Attempt to use a terminated SPDC license: Suppose that the license L s is terminated and U attempts to play s by using a local HMBS copy at which rk(U) is still in the registration set Z s . The user U, however, cannot provide the up-to-dateness of Z s to the manager program (MP), since the MP would refuse to play s by checking that Z s is not from the latest HMBS.
Attempt to use the SPDC license without ever paying fee: Suppose that U attempts to use the license L s without ever paying the license fee to the owner P of s. In other words, U never has requested a transaction like (26) to be recorded in one of SC segments. We note that U can play s if his registration key rk(U) is in the registration key set Z s of s. Therefore, if U could find the solution q of (9) with Z s containing rk(U), then this attempt might work at first glance. This approach is, however, worthless for following reasons: • As a single miner, U would have extreme difficulty in finding the solution q of (9). • Even if U finds the solution q of (9), he can only modify Z s in his local copy of the HMBS. He cannot verify the validity and the up-to-dateness of the modified Z s to the MP, and hence the MP refuses to play s.
It is also conceivable that U could make the smart contract sc request rk(U) to be in Z s in some dSC segments, say,Ŝ σ must have a transaction which shows the purchase of the L s by U from P. This contradicts our early assumption that U never has requested a transaction like (26) for the purchase of L s . Thus, it is impossible to use an SPDC license without ever paying the fee.
Attempt to use the SPDC license after reselling it: Suppose that U attempts to play s after reselling the SPDC license L s to a user V. The transfer of the SPDC license L s from U to V indicates that the registration key rk(U) used in playing s is removed from Z s . Therefore, U cannot play s anymore.
Double HMBS coin spending: Suppose that U makes two transactions t 1 and t 2 to spend the same HMBS coin. Here we can exclude the case when t 1 or t 2 are in dSC segments with the reason that dSCs record smart contracts only, and the dSC block reward must be given in MC after smart contracts are executed in AC (we can include this kind of rule in smart contracts in dSCs from the beginning).
We begin with the case when both t 1 and t 2 are requested for approval in MC. In this case, it is obvious that only one of t 1 and t 2 can be approved in the sequential chain of MC blocks.
Next, we consider the case when t 1 ∈ B [k] in MC and t 2 ∈ b σ segment that starts from B [k ] and ends at B [k ] . We first consider the case when t 1 and t 2 are in different SCs, i.e., σ =σ. In this case, all k , k , k , andk are distinct, and hence it suffices to consider the following four cases. Each of them prevents double HMBS coin spending as follows: If k =k and k =k , i.e., t 1 and t 2 are in the same SC segment, then only one of t 1 and t 2 is recorded in that segment, and eventually regarded as valid in MC.
These arguments so far show that the proposed method allows only one of t 1 and t 2 to be regarded as valid in MC, and hence prevents double HMBS coin spending.
Double license reselling: Suppose that U attempts to resell L s to both users V and W by requesting two transactions t 1 (L s to V) and t 2 (L s to W) to be recorded in SCs. Here we note that t 1 and t 2 must be recorded in the same SC, since t 1 and t 2 are transactions related to the same SPDC s. Thus, only one of t 1 and t 2 can be recorded in the sequential chain of blocks in single SC.
Malicious coin transferring to another user's registration key: Suppose U attempts to harm a user V by performing the following: • U transfers a small amount of HMBS coin to a registration key rk(V) of V, without V knowing, to make the HMBS coin assigned to rk(V) not equal to the registration fee; and • U requests the termination of rk(V) with the evidence that the amount of coin assigned to rk(V) is not equal to the registration fee.
At this point, rk(V) is used at least twice; once in representing the coin of the registration fee for V and the other in representing the coin received from U. This could produce confusion; some miners might consider rk(V) as invalid by judging that the latter one represents the registration fee.
To avoid this type of the wrong accusation, the proposed method lets the accused user V have an 'appeal chance'. When V is informed that their registration key rk(V) is to be unregistered, V will spend all coins assigned to rk(V) except the original registrationfee-representing coin and request the nullification of the transaction that showed rk(V) as invalid. Even in the case when rk(V) is already unregistered, V can still reverse the termination of all SPDC licenses of s assigned to rk(V) by using the described method.
Notice that this approach does not work for the case when the private key rk(V) paired with the registration key rk(V) is disclosed; whenever V fills the HMBS coin assigned to rk(V) to be equal to the registration fee, someone who knows rk(V) would spend the coin assigned to rk(V), and hence the registration key rk(V) would be requested for the termination, again.
Head start block mining: The block mining in the proposed method, whether it is in MC, AC, SC or dSC, needs the hash value of the immediately preceding block. Therefore, the mining of the next block is worthless, in the case when the hash value of the current block is not computed yet.
Head start computation of the input value: In the proposed method, miners in dSC network must make smart contracts in the dSC segment, say,Ŝ σ . For instance, to make the smart contract (29), miners in dSC network must check whether the request of changing Z s to Z s is correct, including the validity of hash values of SC blocks (in S

Conclusions
In this study, we propose a digital content service model based on a hierarchical multi-blockchain system (HMBS). The proposed method uses the HMBS as a tool to use the cryptocurrency for license fee collecting and manage content accounts defining license usage rules in the accountchain (AC). In addition, the proposed method uses several sidechains (SCs) and dual sidechains (dSCs) to efficiently record transactions and smart contracts of the HMBS by parallel processing. The transparent traceability and the tamperproof nature of the proposed HMBS allow content owners to hire several promoters to increase content sale revenues, without worrying about the possibility of revenue hiding by some promoters.
The proposed method distributes digital content in the self decryptable encrypted format and makes the self decryption controlled only by a program called the indistinguishably embedded immobilizer (IM). The IM controls the decryption of content based on the HMBS received from the manager program (MP). The role of MP is to provide the latest HMBS to the IM. In this sense, the proposed method uses the HMBS as a secret key in decrypting digital content. By doing so, the proposed method can easily revoke the service to bad users.
The proposed method uses white-box cryptographic methods to allow SPDC to be stored safely in a hostile environment, such as users' hard drives. Furthermore, by making SPDC self decryptable, decryption keys can be disposable immediately after they are used in the creation of SPDC.
The HMBS controls the whole procedure of SPDC license distribution automatically. Thus, the SPDC owner does not need to respond to the SPDC license buying request; the smart contract of the HMBS gives the SPDC license to the buyer and collects the payment for the SPDC owner automatically.
The proposed digital content service model can give more benefit to users and content owners than current monopolistic platform services. The proposed method allows content owners to distribute their digital content and collect license fees without resorting to intermediaries which would demand a significant portion of revenues. The proposed method also provides various options to owners in promoting their content. For instance, their digital content can be sold in time-limited, device-limited, or license-transfer-numberlimited versions, et cetera. Users will be also beneficial by not having intermediaries. Nowadays, intermediary platform companies set almost identical fixed prices for similar kinds of digital content, even though some content owners want to lower the price to promote their content more. In the proposed method, however, the price will be determined by the owner, and hence users will enjoy reduced prices.
The self decryptable encrypted format in the proposed method would generate extra overheads in distributing and storing digital content. The future research program includes a study on reducing those overheads along with an empirical evaluation of the proposed smart propertization method for the protection of intellectual rights on digital content.