Browse > Article
http://dx.doi.org/10.13089/JKIISC.2004.14.3.145

Secure Oblivious Transfer Protocol-based Digital Fingerprinting Against Conspiracy Attack  

최재귀 (부경대학교)
박지환 (부경대학)
김태석 (동의대학교)
Abstract
Digital fingerprinting schemes are cryptographic methods that a seller can identify a traitor who illegally redistributed digital contents by embedding it into buyer's information. Recently, Josep Domingo-Ferrer suggested an anonymous digital fingerprinting scheme based on committed oblivious transfer protocol. It is significant in the sense that it is completely specified from a computation point of view and is thus readily implementable. But this scheme has the serious problem that it cannot provide the security of buyers. In this paper, we first show how to break the existing committed oblivious transfer-based fingerprinting schemes and then suggest secure fingerprinting scheme by introducing oblivious transfer protocol with two-lock cryptosystem based on discrete logarithm. All computations are performed efficiently and the security degree is strengthened in our proposal.
Keywords
Digital fingerprinting; conspiracy attack; oblivion transfer; two-lock cryptosystem;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Practical t-out-n Oblivious Transfer and Its Applications /
[ Qian-Hong Wu;Jian-Hong Zhang;Yu-Min Wang ] / ICICS2003, LNCS 2836
2 Resistance of Digital Watermarks to Collusive Attacks /
[ Joe Killian;F.Thomson Leighton;Lasely,R.Matheson;Talal,G.Shannon;Rovert,E.Tarjan;Francis Zane ] / Proceedings of 1998 ISIT
3 Anonymous Finger printing Based on Committed Oblivious Transfer /
[ J.Domingo-Ferrer ] / PKC99, LNCS 1560
4 Secure Spread Spectrum Watermarking for Image. Audio and Video /
[ I.J.Cox;J.Kilian;T.Leighton;T.Shamnon ] / IEEE Transactions on Image Processing   DOI   ScienceOn
5 Anonymous Fingerprinting with Direct Non-Repudiation /
[ B.Pfitzmann;Ahmad-Reza Sadeghi ] / Asiacrypt2000, LNCS 1976
6 Collusion-secure Fingerprinting for Digital Data /
[ D.Boneh;J.Shaw ] / Crypto95, LNCS 963
7 Anonymous Fingerprinting /
[ B.Pfitzman;W.Waidner ] / Eurocrypto97 LNCS 1233
8 How to Break a Semi-anonymous Fingerprinting Scheme /
[ Ahmad-Reza Sadeghi ] / IH2001, LNCS2137
9 Efficient Anonymous Fingerprinting with Group Signatures /
[ Jan Camenisch ] / Asicacrypt2000, LNCS 1976