Protocols for Collusion-Secure Asymmetric Fingerprinting (Extended Abstract)

作者: Ingrid Biehl , Bernd Meyer

DOI: 10.1007/BFB0023476

关键词:

摘要: In [16] asymmetric fingerprinting of data is presented as a new method copyright protection. The merchant the and each buyer interact in such way that gets an individually fingerprinted version data, while does not know version. If finds illegally redistributed he can trace at least one dishonest even if collusion c buyers created Since himself never sees buyers' versions cannot cast suspicion on some innocent by redistributing appropriate versions.

参考文章(13)
U. Feige, A. Shamir, Zero knowledge proofs of knowledge in two rounds international cryptology conference. pp. 526- 544 ,(1989) , 10.1007/0-387-34805-0_46
Gilles Brassard, Claude Crepeau, Jean-Marc Robert, All-or-nothing disclosure of secrets international cryptology conference. pp. 234- 238 ,(1987) , 10.1007/3-540-47721-7_17
G. R. Blakley, C. Meadows, G. B. Purdy, Fingerprinting long forgiving messages international cryptology conference. pp. 180- 189 ,(1985) , 10.1007/3-540-39799-X_15
Dan Boneh, James Shaw, Collusion-Secure Fingerprinting for Digital Data international cryptology conference. pp. 452- 465 ,(1995) , 10.1007/3-540-44750-4_36
Shafi Goldwasser, Silvio Micali, Charles Rackoff, The knowledge complexity of interactive proof systems SIAM Journal on Computing. ,vol. 18, pp. 186- 208 ,(1989) , 10.1137/0218012
Birgit Pfitzmann, Michael Waidner, Asymmetric fingerprinting for larger collusions computer and communications security. pp. 151- 160 ,(1997) , 10.1145/266420.266453
O. Goldreich, Towards a theory of software protection and simulation by oblivious RAMs symposium on the theory of computing. pp. 182- 194 ,(1987) , 10.1145/28395.28416
Cynthia Dwork, Jeffrey Lotspiech, Moni Naor, Digital signets: self-enforcing protection of digital information (preliminary version) symposium on the theory of computing. pp. 489- 498 ,(1996) , 10.1145/237814.237997