Skip to main content

Protocols for collusion-secure asymmetric fingerprinting

Extended abstract

  • Complexity Theory II
  • Conference paper
  • First Online:
STACS 97 (STACS 1997)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1200))

Included in the following conference series:

Abstract

In [16] asymmetric fingerprinting of data is presented as a new method of copyright protection. The merchant of the data and each buyer interact in such a way that the buyer gets an individually fingerprinted version of the data, while the merchant does not know the version. If the merchant finds an illegally redistributed version of the data he can trace at least one dishonest buyer even if a collusion of c dishonest buyers created that version. Since the merchant himself never sees the buyers' versions he cannot cast suspicion on some innocent buyers by redistributing appropriate versions.

We present a general construction of an asymmetric fingerprinting scheme based on some arbitrary symmetric fingerprinting scheme. Moreover, we give a construction which is more suitable for broadcast data than the constructions presented in [16].

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. D. Beaver, Secure Multiparty Computation Protocols and Zero-Knowledge Proof Systems Tolerating a Faulty Minority, Journal of Cryptology, 1991, pp. 75–122.

    Google Scholar 

  2. G.R. Blakeley, C. Meadows, G.B. Purdy, Fingerprinting Long Forgiving Messages, Proc. CRYPTO'85, Springer, 1986, pp. 180–189.

    Google Scholar 

  3. Dan Boneh, James Shaw, Collusion-Secure Fingerprinting for Digital Data, Proc. CRYPTO'95, Springer, 1995, pp. 452–465.

    Google Scholar 

  4. Dan Boneh, James Shaw, Collusion-Secure Fingerprinting for Digital Data, Princeton Computer Science Technical Report TR-468-94, 1994.

    Google Scholar 

  5. Gilles Brassard, Claude Crepeau, Jean-Marc Robert, All-or-Nothing Disclosure of Secrets, Proc. CRYPTO'86, Springer, 1987.

    Google Scholar 

  6. Germano Caronni, Assuring Ownership Rights for Digital Images, Proc. Verläßliche Informationssysteme'95, Wiesbaden, 1995, pp. 251–263.

    Google Scholar 

  7. D. Chaum, I. Damgard, J. van de Graaf, Multiparty Computations Ensuring Privacy of each Party's Input and Correctness of the Result, Proc. CRYPTO'87, Springer, 1988, pp. 88–119.

    Google Scholar 

  8. Benny Chor, Amos Fiat, Moni Naor, Tracing Traitors, Proc. CRYPTO'94, Springer, 1994, pp. 257–270.

    Google Scholar 

  9. C. Dwork, J. Lotspiech, M. Naor, Digital Signets: Self-Enforcing Protection of Digital Information, Proc. 28th STOC, 1996.

    Google Scholar 

  10. Uriel Feige, Adi Shamir, Zero-Knowledge Proofs of Knowledge in Two Rounds, Proc. of CRYPTO'89, Springer, 1990.

    Google Scholar 

  11. O. Goldreich, Towards a Theory of Software Protection and Simulation by Oblivious RAMs, Proc. 19th STOC, 1987, pp. 218–229.

    Google Scholar 

  12. O. Goldreich, Foundations of Cryptography, manuscript, available at http://www.wisdom.weizmann.ac.il/people/homepages/oded/frag.html.

    Google Scholar 

  13. S. Goldwasser, S. Micali, C. Rackoff, The Knowledge Complexity of Interactive Proof Systems, SIAM Journal on Computing, Vol. 18, No. 1, 1989, pp. 186–208.

    Article  Google Scholar 

  14. Rafail Ostovsky, An efficient Software Protection Scheme, Proc. CRYPTO'89, Springer, 1990, pp. 610–611.

    Google Scholar 

  15. Birgit Pfitzmann, Trials of Traced Traitors (Extended Abstract), Proc. Workshop on Information Hiding, Cambridge, UK, 1996, Proc. to appear in LNCS, Springer.

    Google Scholar 

  16. Birgit Pfitzmann, Mathias Schunter, Asymmetric Fingerprinting, Proceedings EUROCRYPT'96, Springer, 1996.

    Google Scholar 

  17. Birgit Pfitzmann, Michael Waidner, Asymmetric Fingerprinting for Larger Collusions, Proc. of the 4th ACM Conference on Computer and Communications Security, 1997, to appear; preliminary Version IBM Research Report RZ 2857 (#90805) 08/19/96, IBM Research Division, Zürich.

    Google Scholar 

  18. M. Tompa, H. Woll, Random Self-Reducibility and Zero-Knowledge Interactive Proofs of Possession of Information, Proc. 28th FOCS, 1987, pp. 472–482.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Rüdiger Reischuk Michel Morvan

Rights and permissions

Reprints and permissions

Copyright information

© 1997 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Biehl, I., Meyer, B. (1997). Protocols for collusion-secure asymmetric fingerprinting. In: Reischuk, R., Morvan, M. (eds) STACS 97. STACS 1997. Lecture Notes in Computer Science, vol 1200. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0023476

Download citation

  • DOI: https://doi.org/10.1007/BFb0023476

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-62616-9

  • Online ISBN: 978-3-540-68342-1

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics