{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T04:21:25Z","timestamp":1772252485570,"version":"3.50.1"},"reference-count":82,"publisher":"MDPI AG","issue":"2","license":[{"start":{"date-parts":[[2018,5,31]],"date-time":"2018-05-31T00:00:00Z","timestamp":1527724800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cryptography"],"abstract":"<jats:p>This paper presents a method for a decentralised peer-to-peer software license validation system using cryptocurrency blockchain technology to ameliorate software piracy, and to provide a mechanism for software developers to protect copyrighted works. Protecting software copyright has been an issue since the late 1970s and software license validation has been a primary method employed in an attempt to minimise software piracy and protect software copyright. The method described creates an ecosystem in which the rights and privileges of participants are observed.<\/jats:p>","DOI":"10.3390\/cryptography2020010","type":"journal-article","created":{"date-parts":[[2018,6,1]],"date-time":"2018-06-01T03:02:50Z","timestamp":1527822170000},"page":"10","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["ReSOLV: Applying Cryptocurrency Blockchain Methods to Enable Global Cross-Platform Software License Validation"],"prefix":"10.3390","volume":"2","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3876-0940","authenticated-orcid":false,"given":"Alan","family":"Litchfield","sequence":"first","affiliation":[{"name":"Service and Cloud Computing Research Lab, Auckland University of Technology, Auckland 1010, New Zealand"}]},{"given":"Jeff","family":"Herbert","sequence":"additional","affiliation":[{"name":"Cybercraft, Auckland 0600, New Zealand"}]}],"member":"1968","published-online":{"date-parts":[[2018,5,31]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"316","DOI":"10.1016\/S0167-4048(03)00411-5","article-title":"Methods for preventing unauthorized software distribution","volume":"22","author":"Peyravian","year":"2003","journal-title":"Comput. Secur."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1108\/eb057469","article-title":"Software Piracy\u2014The Problems","volume":"87","author":"Morgan","year":"1987","journal-title":"Ind. Manag. Data Syst."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Sachan, A., Emmanuel, S., and Kankanhalli, M. (2009, January 9). Efficient license validation in MPML DRM architecture. Proceedings of the Nineth ACM Workshop on Digital Rights Management, Chicago, IL, USA.","DOI":"10.1145\/1655048.1655060"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"631","DOI":"10.1007\/s10009-012-0259-5","article-title":"Relating software validation to technology trends","volume":"14","author":"Liu","year":"2012","journal-title":"Int. J. Softw. Tools Technol. Transf."},{"key":"ref_5","unstructured":"Herbert, J., and Litchfield, A. (2015, January 27\u201330). A Novel Method for Decentralised Peer-to-Peer Software License Validation Using Cryptocurrency Blockchain T echnology. Proceedings of the 38th Australasian Computer Science Conference (ACSC 2015), Sydney, Australia."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"950","DOI":"10.1145\/358234.358271","article-title":"Hardware protection against software piracy","volume":"27","author":"Maude","year":"1984","journal-title":"ACM"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1109\/C-M.1977.217671","article-title":"Preventing Software Piracy","volume":"29","author":"Mooers","year":"1977","journal-title":"Computer"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1109\/MS.1986.234396","article-title":"Software Authorization Systems","volume":"3","author":"Suhler","year":"1986","journal-title":"IEEE Softw."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1016\/0378-7206(92)90044-G","article-title":"Software piracy and software security measures in business schools","volume":"23","author":"Im","year":"1992","journal-title":"Inf. Manag."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"419","DOI":"10.1177\/001872679304600401","article-title":"A Comparative Examination of Attitudes Toward Software Piracy Among Business Professors and Executives","volume":"46","author":"Taylor","year":"1993","journal-title":"Hum. Relat."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1287\/mnsc.37.2.125","article-title":"Software piracy: An analysis of protection strategies","volume":"37","author":"Conner","year":"1991","journal-title":"Manag. Sci."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1257\/jep.8.2.93","article-title":"Systems competition and network effects","volume":"8","author":"Katz","year":"1994","journal-title":"J. Econ. Perspect."},{"key":"ref_13","first-page":"163","article-title":"A strategic approach to software protection","volume":"8","author":"Shy","year":"1999","journal-title":"J. Econ. Manag. Strateg."},{"key":"ref_14","first-page":"543","article-title":"Back to software \u201cprofitable piracy\u201d: The role of information diffusion","volume":"29","author":"Darmon","year":"2009","journal-title":"Econ. Bull."},{"key":"ref_15","unstructured":"Business Software Alliance (2014). The Compliance Gap, Business Software Alliance. Technical Report."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"431","DOI":"10.1080\/13600869855298","article-title":"Software Piracy and Global Competitiveness: Report on Global Software Piracy","volume":"12","author":"Traphagan","year":"1998","journal-title":"Int. Rev. Law Comput. Technol."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"284","DOI":"10.1016\/j.jpolmod.2011.08.014","article-title":"Does software piracy affect economic growth?: Evidence across countries","volume":"34","author":"Goel","year":"2012","journal-title":"J. Policy Model."},{"key":"ref_18","unstructured":"(2018, March 15). Business Software Alliance. Available online: http:\/\/ww2.bsa.org\/country\/Anti-Piracy\/What-is-Software-Piracy\/TypesofPiracy.aspx?sc{_}lang=en-AU."},{"key":"ref_19","unstructured":"Gantz, J.F., Vavra, T., Lim, V., Soper, P., Smith, L., and Minton, S. Unlicensed Software and Cybersecurity Threats; White Paper; Business Software Alliance; Washington, DC, USA, 2015."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"753","DOI":"10.1007\/s11227-013-1061-1","article-title":"Pirax: Framework for application piracy control in mobile cloud environment","volume":"68","author":"Khan","year":"2014","journal-title":"J. Supercomput."},{"key":"ref_21","unstructured":"Davies, C. (2018, May 31). 95% Android Game Piracy Experience Highlights App Theft challenge. Available online: http:\/\/goo.gl\/BWhej1."},{"key":"ref_22","unstructured":"Keyes, D. (2018, May 31). Android\u2013The Perfect Piracy Storm. Available online: http:\/\/goo.gl\/428ZmP."},{"key":"ref_23","unstructured":"Smith, D. (2018, May 31). Android Still Has A Massive Piracy Problem. Available online: http:\/\/www.businessinsider.com.au\/android-piracy-problem-2015-1."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Computer Fraud and Security (2011). Android marketplace hit by malware. Comput. Fraud Secur., 2011, 3.","DOI":"10.1016\/S1361-3723(11)70025-2"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"204","DOI":"10.1108\/09685221011079171","article-title":"Exploring the supply of pirate software for mobile devices: An analysis of software types and piracy groups","volume":"18","author":"Sigi","year":"2010","journal-title":"Inf. Manag. Comput. Secur. Comput. Secur."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"295789","DOI":"10.1155\/2014\/295789","article-title":"Software authority transition through multiple distributors","volume":"2014","author":"Han","year":"2014","journal-title":"Sci. World J."},{"key":"ref_27","unstructured":"(2018, March 15). BBC Technology Desk. Available online: http:\/\/www.bbc.com\/news\/technology-34338362."},{"key":"ref_28","unstructured":"Davies, C. (2018, May 31). Virus Scanner\u2013or Malware?. Available online: https:\/\/www.cnet.com\/news\/virus-scanners-filled-with-malware-are-flooding-app-stores\/."},{"key":"ref_29","unstructured":"Palmer, B.P. (2014). Anonymously Establishing Digital Provenance in Reseller Chains. [Ph.D. Thesis, Victoria University Of Wellington]."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"970","DOI":"10.1109\/TC.2009.26","article-title":"Collusive Piracy Prevention in P2P Content Delivery Networks","volume":"58","author":"Xiaosong","year":"2009","journal-title":"IEEE Trans. Comput."},{"key":"ref_31","unstructured":"(2018, March 15). ISO\/IEC. Available online: https:\/\/www.iso.org\/obp\/ui\/#iso:std:iso-iec:19770:-1:ed-3:v1:en."},{"key":"ref_32","unstructured":"(2018, March 22). Verafirm. Available online: http:\/\/www.verafirm.org."},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Veerubhotla, R.S., and Saxena, A. (2011, January 5\u20138). A DRM Framework Towards Preventing Digital Piracy. Proceedings of the 2011 7th International Conference on Information Assurance and Security (IAS), Melacca, Malaysia.","DOI":"10.1109\/ISIAS.2011.6122785"},{"key":"ref_34","unstructured":"Fortin, C. (2018, May 31). Master Bitcoin\u2014The Proof of Ownership. Available online: https:\/\/frozenlock.files.wordpress.com\/2011\/11\/master-bitcoin.pdf."},{"key":"ref_35","unstructured":"Lebo, A. (2018, May 31). Dissent. Available online: https:\/\/github.com\/aaron-lebo\/dissent."},{"key":"ref_36","first-page":"80","article-title":"Marginally useful: Bitcoin itself may not flourish as a currency, but the underlying technology is beginning to suggest valuable new applications","volume":"117","author":"Ford","year":"2014","journal-title":"MIT Technol. Rev."},{"key":"ref_37","unstructured":"Nakamoto, S. (2017, March 27). Bitcoin: A Peer-to-Peer Electronic Cash System. Available online: https:\/\/bitcoin.org\/bitcoin.pdf."},{"key":"ref_38","unstructured":"Brikman, Y. (2018, May 31). Bitcoin by Analogy. Available online: https:\/\/www.ybrikman.com\/writing\/2014\/04\/24\/bitcoin-by-analogy\/."},{"key":"ref_39","unstructured":"Peteanu, R. (2018, May 31). Fraud Detection in the World of Bitcoin. Available online: https:\/\/bitcoinmagazine.com\/articles\/fraud-detection-world-bitcoin-1395827419\/."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1016\/S1361-3723(13)70101-5","article-title":"The problem with Bitcoin","volume":"2013","author":"Bradbury","year":"2013","journal-title":"Comput. Fraud Secur."},{"key":"ref_41","unstructured":"Courtois, N.T. (2018, March 15). Crypto Currencies And Bitcoin. Available online: http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.684.2678&rep=rep1&type=pdf."},{"key":"ref_42","unstructured":"Hanley, B.P. (arXiv, 2013). The False Premises and Promises of Bitcoin, arXiv."},{"key":"ref_43","first-page":"377","article-title":"Regulating Digital Currencies: Bringing Bitcoin within the Reach of the IMF","volume":"14","author":"Plassaras","year":"2013","journal-title":"Chic. J. Int. Law"},{"key":"ref_44","unstructured":"Bass, E., Bault, T., Baum, A., Channell, J., Englander, S., Ghose, R., Ho, S., Hopkins, D., Juvekar, P., and May, M. (2018, May 31). Disruptive Innovations II Ten More Things to Stop and Think About. Available online: https:\/\/www.citivelocity.com\/citigps\/ReportSeries.action?recordId=25."},{"key":"ref_45","unstructured":"Duivestein, S., and Savalle, P. (2018, May 31). Bitcoin: It\u2019s the Platform, not the Currency, Stupid!. Available online: http:\/\/thenextweb.com\/insider\/2014\/02\/15\/Bitcoin-platform-currency\/1\/."},{"key":"ref_46","unstructured":"Prisco, G. (Bitcoin Magazine, 2015). The New Stellar Consensus Protocol Could Permit Faster and Cheaper Transactions, Bitcoin Magazine."},{"key":"ref_47","unstructured":"McCook, H. (2018, May 22). An Order-of-Magnitude Estimate of the Relative Sustainability of the Bitcoin Network. Available online: https:\/\/bitcoin.fr\/public\/divers\/docs\/Estimation_de_la_durabilite_et_du_cout_du_reseau_Bitcoin.pdf."},{"key":"ref_48","unstructured":"Buterin, V. (Bitcoin Magazine, 2013). Mastercoin: A Second-Generation Protocol on the Bitcoin Blockchain, Bitcoin Magazine."},{"key":"ref_49","unstructured":"Halford, R. (2018, May 31). Gridcoin White Paper: The Computation Power Of A Blockchain Driving Science & Data Analysis. Available online: https:\/\/www.gridcoin.us\/assets\/img\/whitepaper.pdf."},{"key":"ref_50","unstructured":"King, S., and Nadal, S. (2018, March 15). PPCoin: Peer-to-Peer Crypto-Currency with Proof-of-Stake. Available online: https:\/\/peercoin.net\/assets\/paper\/peercoin-paper.pdf."},{"key":"ref_51","unstructured":"Hochstein, M. (2014). Why Bitcoin Matters for Bankers, American Banker."},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Baran, P. (1964). On Distributed Communications: I. Introduction to Distributed Communications Networks, RAND Corporation.","DOI":"10.7249\/RM3420"},{"key":"ref_53","unstructured":"Buterin, V. (Bitcoin Magazine, 2013). Bootstrapping A Decentralized Autonomous Corporation, Bitcoin Magazine."},{"key":"ref_54","unstructured":"Larimer, D. (2018, March 15). Transactions as Proof-of-Stake. Available online: https:\/\/bravenewcoin.com\/assets\/Whitepapers\/TransactionsAsProofOfStake10.pdf."},{"key":"ref_55","unstructured":"Wood, G. (2018, March 15). Ethereum: A Secure Decentralised Generalised Transaction Ledger Final Draft\u2014Under Review. Available online: https:\/\/bravenewcoin.com\/assets\/Whitepapers\/Ethereum-A-Secure-Decentralised-Generalised-Transaction-Ledger-Yellow-Paper.pdf."},{"key":"ref_56","unstructured":"(2018, March 15). NXT Community. Available online: https:\/\/wiki.nxtcrypto.org\/wiki\/Whitepaper:Nxt."},{"key":"ref_57","unstructured":"Bentov, I., Gabizon, A., and Mizrahi, A. (arXiv, 2014). Cryptocurrencies without Proof of Work, arXiv."},{"key":"ref_58","unstructured":"Sommerville, I. (2010). Software Engineering, Addison Wesley. [9th ed.]."},{"key":"ref_59","doi-asserted-by":"crossref","unstructured":"Laplante, P. (2014). Requirements Engineering for Software and Systems, CRC\/Taylor & Francis.","DOI":"10.1201\/b15939"},{"key":"ref_60","unstructured":"Wood, G. (2018, May 31). Ethereum: A Secure Decentralised Generalised Transaction Ledger. Available online: http:\/\/gavwood.com\/Paper.pdf."},{"key":"ref_61","doi-asserted-by":"crossref","unstructured":"Alqassem, I., and Svetinovic, D. (2015, January 1\u20133). Towards reference architecture for cryptocurrencies: Bitcoin architectural analysis. Proceedings of the 2014 IEEE International Conference on Internet of Things, and Green Computing and Communications, Cyber-Physical-Social Computing, Taipei, Taiwan.","DOI":"10.1109\/iThings.2014.78"},{"key":"ref_62","unstructured":"Buterin, V., Wood, G., Zamfir, V., and Coleman, J. (2018, May 22). Notes on Scalable Blockchain Protocols. Available online: https:\/\/pdfs.semanticscholar.org\/ae5b\/c3aaf0e02a42f4cd41916072c87db0e04ac6.pdf."},{"key":"ref_63","doi-asserted-by":"crossref","unstructured":"Danezis, G., and Meiklejohn, S. (arXiv, 2016). Centrally Banked Cryptocurrencies, arXiv.","DOI":"10.14722\/ndss.2016.23187"},{"key":"ref_64","unstructured":"Oberhauser, A. (2018, March 15). Decentralized Public Ledger as Enabler for the Gift Economy at Scale. Available online: https:\/\/www.researchgate.net\/profile\/Alex_Oberhauser\/publication\/272795715_Decentralized_Public_Ledger_as_Enabler_for_the_Gift_Economy_at_Scale\/links\/54ef0a560cf2e2830865f9c8.pdf."},{"key":"ref_65","unstructured":"Mazi\u00e8res, D. (2018, March 22). The Stellar Consensus Protocol: A Federated Model for Internet-level Consensus. Available online: https:\/\/www.stellar.org\/papers\/stellar-consensus-protocol.pdf."},{"key":"ref_66","doi-asserted-by":"crossref","unstructured":"Kondor, D., P\u00f3sfai, M., Csabai, I., and Vattay, G. (2014). Do the rich get richer? An empirical analysis of the Bitcoin transaction network. PLoS ONE, 9.","DOI":"10.1371\/journal.pone.0086197"},{"key":"ref_67","unstructured":"Glaser, F., and Bezzenberger, L. (2015, January 26\u201329). Beyond Cryptocurrencies\u2014A Taxonomy Of Decentralized Consensus. Proceedings of the 23rd European Conference on Information Systems (ECIS 2015), M\u00fcnster, Germany."},{"key":"ref_68","doi-asserted-by":"crossref","first-page":"153","DOI":"10.69554\/DCTY1654","article-title":"Towards a Framework for the Evaluation and Design of Distributed Ledger Technologies in Banking and Payments","volume":"10","author":"Bott","year":"2016","journal-title":"J. Paym. Strategy Syst."},{"key":"ref_69","unstructured":"European Central Bank (2015). Virtual Currency Schemes, European Central Bank."},{"key":"ref_70","doi-asserted-by":"crossref","unstructured":"Miers, I., Garman, C., Green, M., and Rubin, A.D. (2013, January 19). Zerocoin: Anonymous Distributed E-Cash from Bitcoin. Proceedings of the 2013 IEEE Symposium on Security and Privacy, Berkeley, CA, USA.","DOI":"10.1109\/SP.2013.34"},{"key":"ref_71","first-page":"127","article-title":"A Fistful of Bitcoins: Characterizing Payments Among Men with No Names","volume":"59","author":"Meiklejohn","year":"2013","journal-title":"Commun. ACM"},{"key":"ref_72","unstructured":"Xiaochao, Q. (2018, March 22). Build a Compact Cryptocurrency System Purely Based on PoS. Available online: http:\/\/128.84.21.199\/pdf\/1404.4275v2."},{"key":"ref_73","unstructured":"Buterin, V. (Bitcoin Magazine, 2014). Mining Pool Centralization at Crisis Levels, Bitcoin Magazine."},{"key":"ref_74","unstructured":"Ali, M., Nelson, J., Shea, R., and Freedman, M. (2016, January 22\u201324). Blockstack : A Global Naming and Storage System Secured by Blockchains. Proceedings of the USENIX Annual Technical Conference, Denver, CO, USA."},{"key":"ref_75","unstructured":"Millar, J. (2018, May 31). Enterprise Ethereum Alliance. Available online: https:\/\/duckhip.github.io\/assets\/doc\/EntEthVision-v3.1-24February2017.pdf."},{"key":"ref_76","doi-asserted-by":"crossref","first-page":"343","DOI":"10.1016\/j.irfa.2016.02.008","article-title":"Negative bubbles and shocks in cryptocurrency markets","volume":"47","author":"Fry","year":"2016","journal-title":"Int. Rev. Financ. Anal."},{"key":"ref_77","doi-asserted-by":"crossref","first-page":"624","DOI":"10.5840\/beq201424420","article-title":"Regulating Code: Good Governance and Better Regulation in the Information Age, by Ian Brown and Christopher Marsden. Cambridge","volume":"24","author":"Martin","year":"2014","journal-title":"Bus. Ethics Quart."},{"key":"ref_78","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1257\/jep.29.2.213","article-title":"Bitcoin: Economics, Technology, and Governance","volume":"29","author":"Christin","year":"2015","journal-title":"J. Econ. Perspect."},{"key":"ref_79","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","article-title":"A method for obtaining digital signatures and public-key cryptosystems","volume":"21","author":"Rivest","year":"1978","journal-title":"Commun. ACM"},{"key":"ref_80","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1145\/2366316.2366333","article-title":"Functional Encryption : A New Vision for Public-Key Cryptography","volume":"55","author":"Boneh","year":"2012","journal-title":"Commun. ACM"},{"key":"ref_81","doi-asserted-by":"crossref","first-page":"200","DOI":"10.1016\/j.jnca.2016.09.002","article-title":"A survey on cloud computing security: Issues, threats, and solutions","volume":"75","author":"Singh","year":"2016","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_82","unstructured":"Perkins, E. (2018, March 15). The Identity of Things for the Internet of Things. Available online: http:\/\/blogs.gartner.com\/earl-perkins\/2014\/08\/04\/the-identity-of-things-for-the-internet-of-things\/."}],"container-title":["Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2410-387X\/2\/2\/10\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T15:06:41Z","timestamp":1760195201000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2410-387X\/2\/2\/10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,31]]},"references-count":82,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2018,6]]}},"alternative-id":["cryptography2020010"],"URL":"https:\/\/doi.org\/10.3390\/cryptography2020010","relation":{"has-preprint":[{"id-type":"doi","id":"10.20944\/preprints201803.0217.v1","asserted-by":"object"}]},"ISSN":["2410-387X"],"issn-type":[{"value":"2410-387X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,5,31]]}}}