Browse > Article

Anonymous Fingerprinting Method using the Secret Sharing Scheme  

용승림 (이화여자대학교 컴퓨터학과)
이상호 (이화여자대학교 컴퓨터학과)
Abstract
The illegal copying and redistribution of digitally-stored information is a crucial problem to distributors who electronically sell digital data. Fingerprinting scheme is a techniques which supports copyright protection to track redistributors of electronic information using cryptographic techniques. Anonymous fingerprinting schemes, differ from symmetric fingerprinting, prevent the merchant from framing a buyer by making the fingerprinted version known to the buyer only. And the scheme, differ from asymmetric fingerprinting, allows the buyer to purchase goods without revealing her identity to the merchant. In this paper, a new anonymous fingerprinting scheme based on secret sharing is introduced. The merchant finds a sold version that has been distributed, and then he is able to retrieve a buyer's identity and take her to court. And Schnorr's digital signature prevents the buyer from denying the fact he redistributed. The buyer's anonymity relies on the security of discrete logarithm and secure two-party computations.
Keywords
Anonymous fingerprinting; Secret sharing; Copyright protection; Digital signature;
Citations & Related Records
연도 인용수 순위
  • Reference
1 W. Trappe, M. Wu and K. Liu, 'Collusionresistant fingerprinting for multimedia,' IEEE International Conference on Acoustics, Speech, and Signal Processing, Vol. 4, pp. 3309-3312, 2002   DOI
2 B. Pfitzmann and M. Schunter, 'Asymmetric fingerprinting,' In Advances in Cryptology-EYROCRYPT'96, LNCS 1070, pp. 84-95, 1996
3 C. Chung, S. Choi, Y. Choi and D. Won, 'Efficient anonymous fingerprinting of electronic information with improved automatic identification of redistributors,' ICICS 2000, LNCS 2015, pp. 221-234, 2001
4 D. Chaum, I. B. Damagaard and J. vad de Graaf, 'Multiparty computations ensuring privacy of each party's input and correctness of the result,' In Advances in Cryptology -CRYPTO'87, LNCS 293, pp. 87-119, 1988
5 J. Domingo-Ferrer, 'Anonymous fingerprinting based on committed oblivious transfer.' PKC 1999, LNCS 1560, pp. 43-52. 1999
6 B. Pfitzmann and A. R. Sadeghi, 'Coin-based anonymous fingerprinting,' In Advances in Cryptology-EUROCRYPT '99, LNCS 1592, pp, 150-164, 1999
7 G. Blakley, C. Meadow and G. B. Purdy, 'Fingerprinting long forgiving messages,' In Advances in Cryptology-CRYPTO'85, LNCS 218, pp. 180-189, 1986
8 D. Boneh and J. Shaw, 'Collusion-secure fingerprinting for digital data,' In Advances in Cryptology-CRYPTO '95, LNCS 963, pp. 452-465, 1995
9 M. Kuribayashi and H. Tanaka, A new anonymous fingerprinting scheme with high enciphering rate,' INDOCRYPT'01, LNCS 22247, pp. 30-39, 200
10 B. Pfitzmann and M. Waidner, 'Anonymous fingerprinting,' In Advances in Cryptology-EUROCRYPT'97, LNCS 1233. pp. 88-102, 1997
11 C. Schnorr, 'Efficient signature generation for smart cards,' Journal of Cryptology. 4(3), pp. 161-174, 1991   DOI
12 J. Domingo-Ferrer, 'Anonymous fingerprinting of electronic information with automatic identification redistributors,' LEE Electronic Letters, Vol. 43. No. 13, 1998   DOI   ScienceOn
13 A. Shamir, 'How to share a secret,' CACM, 22(11), pp. 612-613, 1979   DOI   ScienceOn