Browse > Article
http://dx.doi.org/10.3745/KIPSTC.2008.15-C.3.167

Fingerprinting Scheme for Contents Protection in Mobile Environment  

Yong, Seung-Lim (인하공업전문대학 컴퓨터시스템과)
Lee, Sang-Ho (이화여자대학교 컴퓨터학과)
Abstract
Fingerprinting scheme supports the copyright protection to track redistributors of digital content using cryptographic techniques. Fingerprinting schemes should guarantee buyer's anonymity and asymmetry for their privacy. Most of known fingerprinting schemes adopt public-key cryptosystems to achieve asymmetry and discrete logarithm problem or graph isomorphism problem to achieve anonymity. However, these schemes are not suited in mobile environment because of the drawbacks of requiring high computational complexity. In this paper, we propose an efficient fingerprinting scheme for mobile environment to provide not only asymmetry of the protocol but also transaction anonymity of the buyer. By employing symmetric encryption to encrypt the digital content and adopting agent to perform the protocols, the efficiency of the proposed scheme is improved.
Keywords
Contents protection; Fingerprinting scheme; Symmetric encryption system; Mobile environment; Agent;
Citations & Related Records
연도 인용수 순위
  • Reference
1 F. Bao, R. H. Deng and P. Feng, “An Efficient and Practical Scheme for Privacy Protection in the E-commerce of Digital Goods,” International Conference on Information and Communication Security(ICICS'00), LNCS 2836, pp.162-170, 2001   DOI   ScienceOn
2 W. Zhao, V. Varadharajan and Y. Mu, “A Secure Mental Porker Protocol over the Internet,” Australasian Information Security Workshop(AISW'03), Vol.21, pp.105-109, 2003
3 M. Mambo, K. Usuda, and E. Okamoto, “Proxy signature for delegating signing operation”, Proc. Third ACM Conference on Computer and Communications Security, pp.48-57, 1996
4 A. Romao and M. M da Silva, “Secure Mobile Agent Digital Signature with Proxy Certificates,” E-Commerce Agents, LNCS 2033, pp.206-220, 2001   DOI   ScienceOn
5 S. Goldwasser and S. Micali, “Probabilistic Encryption and How to Play Mental Poker Keeping Secret All Partial Information,” ACM Symposium on Theory of Computing (STOC'82), pp.365-377, 1982
6 M. Mambo, K. Usuda and E.Okanmoto, “Proxy signature: delegation of the power to sign messages,” IEICE Transaction on Fundamentals, Vol. E79-A, No.9, pp.1338-1353, 1996
7 J. G. Choi and J .H. Park, “A generalization of an anonymous buyer-seller watermarking protocol and its application to mobile communication,” IWDW'04, LNCS 3304, pp.232-242, 2004
8 E. F. Brickell and Y. Yacobi, “On Privacy Homomorphisms,” Advances in Cryptology-EUROCRYPT'87, LNCS 304, pp.117-125, 1987   DOI