Browse > Article
http://dx.doi.org/10.13089/JKIISC.2006.16.6.151

Weakness and Improvements of Yong-Lee's Anonymous Fingerprinting Protocol  

Sohn, Ki-Wook (National Security Research Institute)
Lee, Yun-Ho (Information Security Group School of Information and Communication Engineering Sungkyunkwan University)
Won, Dong-Ho (Information Security Group School of Information and Communication Engineering Sungkyunkwan University)
Abstract
In 2005, Yong and Lee proposed a buyer-seller fingerprinting protocol using symmetric and commutative encryptions. They claimed that their protocol was practical and anonymous since they used symmetric and commutative encryptions. However, an attacker can get the content embedded with one or more honest buyers' fingerprints using man-in-the-middle attack. In this letter, we point out the weakness and propose methods for improving to their protocol.
Keywords
Fingerprinting; Anonymous Buyer-Seller Protocol; Watermarking; Man-in-the-middle Attack;
Citations & Related Records
연도 인용수 순위
  • Reference
1 C.C.Chang and C.Y.Chung, 'An Enhanced Buyer-Seller Watermarking Protocol,' Proc. of ICCT 2003, pages 1779-1783, 2003
2 F.Bao, R.H.Deng and P.Feng, 'An Efficient and Practical Scheme for Privacy Protection in the E-Commerce of Digital Goods,' ICICS' 00, LNCS 2836, pages 162-170, 2001
3 S.Yong and S.Lee, 'An Efficient Fingerprinting Scheme with Symmetric and Commutative Encryption,' IWDW 2005, LNCS 3710, pages 54-66, 2005
4 J.G.Choi, J.H.Park and K.R.Kwon, 'Analysis of COT-based Fingerprinting Schemes: New Approach to Design Practical and Secure Fingerprinting Scheme,' IHW 2004, LNCS 3200, pages 253-265, 2004