Skip to main content

An Efficient Anonymous Fingerprinting Protocol

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 4456))

Abstract

Fingerprinting schemes are technical means to discourage people from illegally redistributing the digital data they have legally purchased. These schemes enable the original merchant to identify the original users of the digital data. Anonymous fingerprinting schemes allow a seller to fingerprint information sold to a user without knowing the identity of the user and without the seller seeing the fingerprinted copy. Finding a (redistributed) fingerprinted copy enables the seller to find out and prove to third party whose copy it was. In this paper, we propose a new scheme of anonymous fingerprinting by using electronic wallet, in which, the user doesn’t need making a computationally expensive zero-knowledge proof, on finding a fingerprinted copy, the seller can directly determine the redistributor by a simple computation without the help of a registration authority and without making a search for the redistributor’s public key in purchase record. In addition, our scheme can prevent the collusion of merchant and registration center to make false-accusation to honest users. By using electronic wallet, our scheme can be integrated with electronic payment system.

This work is supported by the National Natural Science Foundation of China under Grants 60372046, 60573043 and the Foundation of National Laboratory for Modern Communications under Grant 9140c1108010606.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Boneh, D., Shaw, J.: Collusion-secure Fingerprinting for Digital Data. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 452–465. Springer, Heidelberg (1995)

    Google Scholar 

  2. Blakley, G.R., Blakley, G.R., Meadows, C., Purdy, G.B.: Fingerprinting Long Forgiving Message. In: Williams, H.C. (ed.) Advances in Cryptology. LNCS, vol. 218, pp. 180–189. Springer, Heidelberg (1986)

    Google Scholar 

  3. Pfitzmann, B., Schunter, M.: Asymmetric Fingerprinting. In: Nagl, M. (ed.) WG 1995. LNCS, vol. 1017, pp. 84–95. Springer, Heidelberg (1995)

    Google Scholar 

  4. Pfitzmann, B., Waidner, M.: Anonymous Fingerprinting. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 88–102. Springer, Heidelberg (1997)

    Google Scholar 

  5. Domingo-Ferrer, J.: Anonymous Fingerprinting of Electronic Information with Automatic Identification of Redistributor. IEE Electronics Letters 13, 1303–1304 (1998)

    Article  Google Scholar 

  6. Chung, C., Choi, S., Choi, Y., Won, D.: Efficient Anonymous Fingerprinting of Electronic Information with Improved Automatic Identification of Redistributor. In: Won, D. (ed.) ICISC 2000. LNCS, vol. 2015, pp. 221–234. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  7. Camenish, J.: Efficient Anonymous Fingerpriting with Group Signature. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 415–428. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  8. Wang, Y., Lu, S., Liu, Z.: A Simple Anonymous Fingerprinting Scheme based on Blind Signature. In: Qing, S., Gollmann, D., Zhou, J. (eds.) ICICS 2003. LNCS, vol. 2836, pp. 260–268. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  9. Kim, M., Kim, J., Kim, K.: Anonymous Fingerprinting as Secure as the Bilinear Diffie-Hellman Assumption. In: Deng, R.H., Qing, S., Bao, F., Zhou, J. (eds.) ICICS 2002. LNCS, vol. 2513, Springer, Heidelberg (2002)

    Google Scholar 

  10. Hirofumi Muratani, A., Muratani, H.: A Collusion-Secure Fingerprinting Code Reduced by Chinese Remaindering and Its Random-Error Resilience. In: Moskowitz, I.S. (ed.) Information Hiding - IH 2001. LNCS, vol. 2137, pp. 301–305. Springer, Heidelberg (2001)

    Google Scholar 

  11. Cohen, G., Litsyn, S., Zemor, G.: Binary Codes for Collusion-Secure Fingerprinting. In: Kim, K.-c. (ed.) ICISC 2001. LNCS, vol. 2288, pp. 178–185. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  12. Barg, A., Blakley, G.R., Kabatiansky, G.A.: Digital Fingerprinting Codes: Problem Statements, Construction. Identification of Traiors. IEEE Transaction on Information Theory 49(4), 852–865 (2003)

    Article  MathSciNet  MATH  Google Scholar 

  13. Chaum, D., Damgaard, I.B., van de Graaf, J.: Multiparty computations ensuring privacy of each party’s input and correctness of the result. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 87–119. Springer, Heidelberg (1988)

    Google Scholar 

  14. Bo, Y., Dongsu, L., Yumin, W.: An Anonymity- Revoking e-Payment System with Smart Card. International Journal on Digital Libraries 3(4), 291–296 (2002)

    Article  Google Scholar 

  15. Brands, S.: Off-Line Cash Transfer by Smart Cards. Technical Report CS-R9455,CWI(Centre for Mathematics and Computer Science), Amsterdam (1994), Available at http://www.cwi.nl/static/publications/reports/CS-R9455

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bo, Y., Piyuan, L., Wenzheng, Z. (2007). An Efficient Anonymous Fingerprinting Protocol. In: Wang, Y., Cheung, Ym., Liu, H. (eds) Computational Intelligence and Security. CIS 2006. Lecture Notes in Computer Science(), vol 4456. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74377-4_86

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-74377-4_86

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-74376-7

  • Online ISBN: 978-3-540-74377-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics