Anonymous Fingerprinting for Predelivery of Contents

  • Authors:
  • Kazuhiro Haramura;Maki Yoshida;Toru Fujiwara

  • Affiliations:
  • Graduate School of Information Science and Technology, Osaka University, Osaka, Japan 565-0871;Graduate School of Information Science and Technology, Osaka University, Osaka, Japan 565-0871;Graduate School of Information Science and Technology, Osaka University, Osaka, Japan 565-0871

  • Venue:
  • Information Security and Cryptology --- ICISC 2008
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

Anonymous fingerprinting schemes aim to protect privacy and copyright in the contents delivery services. The schemes protect privacy by enabling buyers to purchase digital goods anonymously unless they redistribute purchased goods. The schemes also protect copyright by enabling the merchant of digital goods to identify the original buyer of a redistributed copy and convince an arbiter of this fact. The key idea of copyright protection is to embed some information which is linkable with the buyer into the contents. This paper presents a new anonymous fingerprinting scheme for a predelivery service where predelivered goods are encrypted by a timed-release encryption scheme so that the buyers can view the contents only after each release date.The major feature of our scheme is to allow the merchant to identify the original buyer of a redistributed ciphertext without decrypting it. Our idea is to force a buyer to attach the embedded information to a purchased ciphertext when the buyer redistributes it before the release date. We call this idea self-enforcing. This paper also proposes two constructions based on previous efficient anonymous fingerprinting schemes. These constructions realize self-enforcing in such a way that the merchant encrypts a purchased copy before encrypting by a timed-release encryption scheme so that the embedded data is needed for decryption. Note that no additional data needs to be sent by the buyer for self-enforcing because data sent by the buyer in the previous schemes is used as an encryption key. This implies efficient countermeasure against redistribution before the release date.