Browse > Article

An Anonymous Asymmetric Fingerprinting Scheme with Trusted Third Party  

Yong, Seung-Lim (이화여자대학교 컴퓨터학과)
Lee, Sang-Ho (이화여자대학교 컴퓨터학과)
Abstract
The illegal copying and redistribution of digitally-stored information is a crucial problem to distributors who electronically sell digital data. fingerprinting scheme is a technique which supports copyright protection to track redistributors of electronic information using cryptographic techniques. Anonymous asymmetric fingerprinting scheme prevents the merchant from framing a buyer by making the fingerprinted version known to the buyer only. And this scheme allows the buyer to purchase goods without revealing her identity to the seller. In this paper, a new anonymous asymmetric fingerprinting scheme with TTP is introduced. The buyer's fingerprint is generated by the Fingerprint Certificate Authority which is a TTP. When the seller embeds the fingerprint in the digital data, the protocol uses the homomorphic encryption scheme. Thus the seller cannot know the buyer's fingerprint and the buyer's anonymity is guaranteed by using anonymous key pair.
Keywords
Anonymous asymmetric fingerprinting; Trusted third party; Copyright protection;
Citations & Related Records
연도 인용수 순위
  • Reference
1 H. Ju, H. Kim, D. LEE and J. Lim, 'An anonymous buyer-seller watermarking protocol with anonymity control,' International Conference on Information and Communication Security(ICICS'02), LNCS 2587, pp. 421-432, 2003
2 http://www.edonkey2000.com
3 D. Chaum, 'An improved protocol for demonstrating possession of discrete logarithms and some generalizations,' In Advances in Cryptology - EUROCRYPT '87, LNCS 304, pp. 127-141, 1987
4 S. Katzenveisser and F. Petitcolas, Information Hiding, 'Techniques for steganography and digital watermarking,' Artech House, 2000
5 http://www.kazaa.com
6 B. Pfitzmann and M. Schunter, 'Asymmetric fingerprinting,' In Advances in Cryptology - EUROCRYPT' 96, LNCS 1070, pp. 84-95, 1996
7 J. Domingo-Ferrer, 'Anonymous fingerprinting of electronic information with automatic identification redistributors,' IEE Electronic Letters, Vol. 43, No. 13, 1998
8 B. Pfitzmann and M. Waidner, 'Anonymous fingerprinting,' In Advances in Cryptology - EUROCRYPT' 97, LNCS 1233, pp. 88-102, 1997
9 J. G. Choi, K. Sakurai and J. H. Park, 'Does it need trusted third party? Design of buyer-seller watermarking in digital contents,' Applied Cryptography and Network Security(ACNS'03), LNCS 2846, pp. 265-279, 2003
10 R. Wagner, 'Fingerprinting,' IEEE Symposium on Security and Privacy, Oakland, pp. 18-22, 1983
11 G. Blakley, C. Meadow and G. B. Purdy, 'Fingerprinting long forgiving messages,' In Advances in Cryptology - CRYPTO'85, LNCS 218, pp. 180-189, 1986
12 M. Kuribayashi and H. Tanaka, 'A new anonymous fingerprinting scheme with high enciphering rate,' INDOCRYPT' 01 , LNCS 22247, pp. 30-39, 2001
13 J. Camenish, 'Efficient anonymous fingerprinting with group signature,' Asisacrypt 2000, LNCS 1976, pp. 415-428, 2000
14 N. Memon and P. W. Wong, 'A buyer-seller watermarking protocol,' IEEE Transactions on Image Processing, Vol. 10, No.4, pp. 643-649, 2001   DOI   ScienceOn
15 I. J. Cox, J. Kilian, T. Leighton and T. Shamnon, 'Secure spread spectrum watermarking for image, audio and video,' IEEE Transactions on Image processing, vol.6, no 12, pp. 1673-1678, 1997   DOI   ScienceOn