Efficient P2P content distribution avoiding expensive cryptographic protocols. Copyright protection and revocable privacy are guaranteed to merchant and buyer. Recombination approach providing automatically constructed fingerprints. Segment-wise construction of fingerprints using Nuida et al.’s c-secure codes. Novel traitor-tracing mechanism in the encrypted domain.