Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/1754495.1754506guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Asymmetric fingerprinting

Published: 12 May 1996 Publication History

Abstract

Fingerprinting schemes deter people from illegal copying of digital data by enabling the merchant of the data to identify the original buyer of a copy that was redistributed illegally. All known fingerprinting schemes are symmetric in the following sense: Both the buyer and the merchant know the fingerprinted copy. Thus, when the merchant finds this copy somewhere, there is no proof that it was the buyer who put it there, and not the merchant.
We introduce asymmetric fingerprinting. where only the buyer knows the fingerprinted copy, and the merchant, upon finding it somewhere, can find out and prove to third parties whose copy it was. We present a detailed definition of this concept and constructions. The first construction is based on a quite general symmetric fingerprinting scheme and general cryptographic primitives; it is provably secure if all these underlying schemes are. We also present more specific and more efficient constructions.

References

[1]
Josh Cohen Benaloh: Verifiable Secret-Ballot Elections Dissertation, Yale University, September 1987.
[2]
Donald Beaver: Secure Multiparty Protocols and Zero Knowledge Proof Systems Tolerating a Faulty Minority Journal of Cryptology 4/2 (1991) 75-122.
[3]
Giles Brassard, David Chaum, Claude Crépeau: Minimum Disclosure Proofs of Knowledge Journal of Computer and System Sciences 37 (1988) 156-189.
[4]
J. Brassil, S. Low, N. Maxemchuk, L. O'Gorman: Electronic Marking and Identification Techniques to Discourage Document Copying Proceedings IEEE INFOCOM 94, Toronto, June 12-16, 1994, 1278-1287.
[5]
G. R. Blakley, C. Meadows, G. B. Purdy: Fingerprinting Long Forgiving Messages, Crypto '85, LNCS 218, Springer-Verlag, Berlin 1986, 180-189.
[6]
Dan Boneh, James Shaw: Collusion-Secure Fingerprinting for Digital Data Crypt0 '95, LNCS 963, Springer-Verlag, Berlin 1995, 452-465.
[7]
Germano Caronni: Assuring Ownership Rights for Digital Images Proceedings VIS '95; Vieweg, Wiesbaden 1995, 251-263.
[8]
David Chaum, Ivan B. Damgård, Jeroen van de Graaf: Multiparty computation ensuring privacy qf each party's input and correctness of the result Crypto '87, LNCS 293, Springer-Verlag, Berlin 1988, 87-119.
[9]
Josh D. Cohen, Michael J. Fischer: A robust and verifiable cryptographically secure election scheme 26th FOCS, 1985, 372-382.
[10]
Benny Chor, Amos Fiat, Moni Naor: Tracing traitors Crypto '94, LNCS 839, Springer-Verlag, Berlin 1994, 257-270.
[11]
Abhijit K. Choudhury, Nicholas F. Maxemchuk, Sanjoy Paul, Henning G. Schulzrinne: Copyright Protection for Electronic Publishing Over Computer Networks IEEE Network 9/3 (1995) 12-20.
[12]
Oded Goldreich: Towards a Theory of Software Protection and Simulation by Oblivious RAMs 19th STOC, 1987, 182-194.
[13]
Oded Goldreich, Silvio Micali, Avi Wigderson: How to play any mental game - or - a completeness theorem fur protocols with honest majority 19th STOC, 1987, 218-229.
[14]
Jeroen van de Graaf, René Peralta: A simple and secure way to show the validy of your public key Crypto '87, LNCS 293, Springer-Verlag, Berlin 1988, 128-134.
[15]
Benoit M. Macq, Jean-Jacques Quisquater: Cryptology for Digitul TV Broadcasting Proceedings of the IEEE 83/6 (1995) 944-957.
[16]
Silvio Micali, Phillip Rogaway: Secure Computation (Chapters 1-3) Laboratory for Computer Science, MIT; distributed at Crypto '91.
[17]
Rafail Ostrovsky: An efficient software protection scheme Crypto '89, LNCS 435, Springer-Verlag, Heidelberg 1990, 610-611.
[18]
Neal R. Wagner: Fingerprinting IEEE Symposium on Security and Privacy, Oakland, 1983, 18-22.
[19]
Andrew Chi-Chih Yao: How to Generate and Exchange Secrets 27th FOCS, 1986. 162-167.

Cited By

View all
  • (2016)PSUMJournal of Network and Computer Applications10.1016/j.jnca.2016.03.00766:C(180-197)Online publication date: 1-May-2016
  • (2013)An asymmetric fingerprinting code for collusion-resistant buyer-seller watermarkingProceedings of the first ACM workshop on Information hiding and multimedia security10.1145/2482513.2482525(35-44)Online publication date: 17-Jun-2013
  • (2011)On the security and practicality of a buyer seller watermarking protocol for DRMProceedings of the 4th international conference on Security of information and networks10.1145/2070425.2070471(251-254)Online publication date: 14-Nov-2011
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
EUROCRYPT'96: Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
May 1996
417 pages
ISBN:354061186X
  • Editor:
  • Ueli Maurer

Sponsors

  • IACR: International Association for Cryptologic Research

In-Cooperation

  • University of Saragossa, Spain

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 12 May 1996

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 25 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2016)PSUMJournal of Network and Computer Applications10.1016/j.jnca.2016.03.00766:C(180-197)Online publication date: 1-May-2016
  • (2013)An asymmetric fingerprinting code for collusion-resistant buyer-seller watermarkingProceedings of the first ACM workshop on Information hiding and multimedia security10.1145/2482513.2482525(35-44)Online publication date: 17-Jun-2013
  • (2011)On the security and practicality of a buyer seller watermarking protocol for DRMProceedings of the 4th international conference on Security of information and networks10.1145/2070425.2070471(251-254)Online publication date: 14-Nov-2011
  • (2010)A provably secure anonymous buyer-seller watermarking protocolIEEE Transactions on Information Forensics and Security10.1109/TIFS.2010.20728305:4(920-931)Online publication date: 1-Dec-2010
  • (2009)On observable delegation of personal data by watermarkingProceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference10.5555/1700527.1700808(1143-1147)Online publication date: 11-Jan-2009
  • (2009)An efficient buyer-seller watermarking protocol based on composite signal representationProceedings of the 11th ACM workshop on Multimedia and security10.1145/1597817.1597820(9-18)Online publication date: 7-Sep-2009
  • (2008)Data Collection with Self-Enforcing PrivacyACM Transactions on Information and System Security10.1145/1455518.147794012:2(1-24)Online publication date: 1-Dec-2008
  • (2008)Iterative Detection Method for CDMA-Based Fingerprinting SchemeInformation Hiding10.1007/978-3-540-88961-8_25(357-371)Online publication date: 15-Oct-2008
  • (2007)Cryptanalysis of two non-anonymous buyer-seller watermarking protocols for content protectionProceedings of the 2007 international conference on Computational science and its applications - Volume Part I10.5555/1802834.1802925(951-960)Online publication date: 26-Aug-2007
  • (2007)Tracing illegal users of videoProceedings of the 2007 international conference on Computational science and its applications - Volume Part III10.5555/1793154.1793250(1046-1055)Online publication date: 26-Aug-2007
  • Show More Cited By

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media