Abstract
Fingerprinting schemes are technical means to discourage people from illegally redistributing the digital data they have legally purchased. These schemes enable the original merchant to identify the original users of the digital data. Anonymous fingerprinting schemes allow a seller to fingerprint information sold to a user without knowing the identity of the user and without the seller seeing the fingerprinted copy. Finding a (redistributed) fingerprinted copy enables the seller to find out and prove to third party whose copy it was. In this paper, we propose a new scheme of anonymous fingerprinting by using electronic wallet, in which, the user doesn’t need making a computationally expensive zero-knowledge proof, on finding a fingerprinted copy, the seller can directly determine the redistributor by a simple computation without the help of a registration authority and without making a search for the redistributor’s public key in purchase record. In addition, our scheme can prevent the collusion of merchant and registration center to make false-accusation to honest users. By using electronic wallet, our scheme can be integrated with electronic payment system.
This work is supported by the National Natural Science Foundation of China under Grants 60372046, 60573043 and the Foundation of National Laboratory for Modern Communications under Grant 9140c1108010606.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Boneh, D., Shaw, J.: Collusion-secure Fingerprinting for Digital Data. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 452–465. Springer, Heidelberg (1995)
Blakley, G.R., Blakley, G.R., Meadows, C., Purdy, G.B.: Fingerprinting Long Forgiving Message. In: Williams, H.C. (ed.) Advances in Cryptology. LNCS, vol. 218, pp. 180–189. Springer, Heidelberg (1986)
Pfitzmann, B., Schunter, M.: Asymmetric Fingerprinting. In: Nagl, M. (ed.) WG 1995. LNCS, vol. 1017, pp. 84–95. Springer, Heidelberg (1995)
Pfitzmann, B., Waidner, M.: Anonymous Fingerprinting. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 88–102. Springer, Heidelberg (1997)
Domingo-Ferrer, J.: Anonymous Fingerprinting of Electronic Information with Automatic Identification of Redistributor. IEE Electronics Letters 13, 1303–1304 (1998)
Chung, C., Choi, S., Choi, Y., Won, D.: Efficient Anonymous Fingerprinting of Electronic Information with Improved Automatic Identification of Redistributor. In: Won, D. (ed.) ICISC 2000. LNCS, vol. 2015, pp. 221–234. Springer, Heidelberg (2001)
Camenish, J.: Efficient Anonymous Fingerpriting with Group Signature. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 415–428. Springer, Heidelberg (2000)
Wang, Y., Lu, S., Liu, Z.: A Simple Anonymous Fingerprinting Scheme based on Blind Signature. In: Qing, S., Gollmann, D., Zhou, J. (eds.) ICICS 2003. LNCS, vol. 2836, pp. 260–268. Springer, Heidelberg (2003)
Kim, M., Kim, J., Kim, K.: Anonymous Fingerprinting as Secure as the Bilinear Diffie-Hellman Assumption. In: Deng, R.H., Qing, S., Bao, F., Zhou, J. (eds.) ICICS 2002. LNCS, vol. 2513, Springer, Heidelberg (2002)
Hirofumi Muratani, A., Muratani, H.: A Collusion-Secure Fingerprinting Code Reduced by Chinese Remaindering and Its Random-Error Resilience. In: Moskowitz, I.S. (ed.) Information Hiding - IH 2001. LNCS, vol. 2137, pp. 301–305. Springer, Heidelberg (2001)
Cohen, G., Litsyn, S., Zemor, G.: Binary Codes for Collusion-Secure Fingerprinting. In: Kim, K.-c. (ed.) ICISC 2001. LNCS, vol. 2288, pp. 178–185. Springer, Heidelberg (2002)
Barg, A., Blakley, G.R., Kabatiansky, G.A.: Digital Fingerprinting Codes: Problem Statements, Construction. Identification of Traiors. IEEE Transaction on Information Theory 49(4), 852–865 (2003)
Chaum, D., Damgaard, I.B., van de Graaf, J.: Multiparty computations ensuring privacy of each party’s input and correctness of the result. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 87–119. Springer, Heidelberg (1988)
Bo, Y., Dongsu, L., Yumin, W.: An Anonymity- Revoking e-Payment System with Smart Card. International Journal on Digital Libraries 3(4), 291–296 (2002)
Brands, S.: Off-Line Cash Transfer by Smart Cards. Technical Report CS-R9455,CWI(Centre for Mathematics and Computer Science), Amsterdam (1994), Available at http://www.cwi.nl/static/publications/reports/CS-R9455
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bo, Y., Piyuan, L., Wenzheng, Z. (2007). An Efficient Anonymous Fingerprinting Protocol. In: Wang, Y., Cheung, Ym., Liu, H. (eds) Computational Intelligence and Security. CIS 2006. Lecture Notes in Computer Science(), vol 4456. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74377-4_86
Download citation
DOI: https://doi.org/10.1007/978-3-540-74377-4_86
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-74376-7
Online ISBN: 978-3-540-74377-4
eBook Packages: Computer ScienceComputer Science (R0)