Security without identification: transaction systems to make big brother obsolete
Communications of the ACM
Fingerprinting long forgiving messages
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
Minimum disclosure proofs of knowledge
Journal of Computer and System Sciences - 27th IEEE Conference on Foundations of Computer Science October 27-29, 1986
Value exchange systems enabling security and unobservability
Computers and Security
Untraceable off-line cash in wallet with observers
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
Embedding robust labels into images for copyright protection
KnowRight '95 Proceedings of the conference on Intellectual property rights and new technologies
Asymmetric fingerprinting for larger collusions
Proceedings of the 4th ACM conference on Computer and communications security
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
Protocols for Collusion-Secure Asymmetric Fingerprinting (Extended Abstract)
STACS '97 Proceedings of the 14th Annual Symposium on Theoretical Aspects of Computer Science
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Collusion-Secure Fingerprinting for Digital Data (Extended Abstract)
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
A Secure, Robust Watermark for Multimedia
Proceedings of the First International Workshop on Information Hiding
Proceedings of the First International Workshop on Information Hiding
SP '83 Proceedings of the 1983 IEEE Symposium on Security and Privacy
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Watermarking maps: hiding information in structured data
SODA '00 Proceedings of the eleventh annual ACM-SIAM symposium on Discrete algorithms
Future mulitmedia databases and research directions
Distributed multimedia databases
Multimedia content screening using a dual watermarking and fingerprinting system
Proceedings of the tenth ACM international conference on Multimedia
Lower bounds for collusion-secure fingerprinting
SODA '03 Proceedings of the fourteenth annual ACM-SIAM symposium on Discrete algorithms
An Asymmetric Traceability Scheme for Copyright Protection without Trust Assumptions
EC-Web 2001 Proceedings of the Second International Conference on Electronic Commerce and Web Technologies
Anonymous Fingerprinting as Secure as the Bilinear Diffie-Hellman Assumption
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
ICISC '00 Proceedings of the Third International Conference on Information Security and Cryptology
Anonymous Traceability Schemes with Unconditional Security
INDOCRYPT '00 Proceedings of the First International Conference on Progress in Cryptology
A New Anonymous Fingerprinting Scheme with High Enciphering Rate
INDOCRYPT '01 Proceedings of the Second International Conference on Cryptology in India: Progress in Cryptology
Efficient Anonymous Fingerprinting with Group Signatures
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Anonymous Fingerprinting with Direct Non-repudiation
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
How to Break a Semi-anonymous Fingerprinting Scheme
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Characteristics of Some Binary Codes for Fingerprinting
ISW '00 Proceedings of the Third International Workshop on Information Security
Traceability Schemes for Signed Documents
ISC '02 Proceedings of the 5th International Conference on Information Security
Anonymous Fingerprinting Based on Committed Oblivious Transfer
PKC '99 Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography
PKC '99 Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography
A Dual Watermark-Fingerprint System
IEEE MultiMedia
From digital audiobook to secure digital multimedia-book
Computers in Entertainment (CIE) - Theoretical and Practical Computer Applications in Entertainment
A survey of homomorphic encryption for nonspecialists
EURASIP Journal on Information Security
Anonymous fingerprinting with robust QIM watermarking techniques
EURASIP Journal on Information Security
An Efficient Anonymous Fingerprinting Protocol
Computational Intelligence and Security
IWDW '07 Proceedings of the 6th International Workshop on Digital Watermarking
Semi-blind Fingerprinting Utilizing Ordinary Existing Watermarking Techniques
IWDW '09 Proceedings of the 8th International Workshop on Digital Watermarking
Classification Framework for Fair Content Tracing Protocols
IWDW '09 Proceedings of the 8th International Workshop on Digital Watermarking
Study on ring signature and its application
CCDC'09 Proceedings of the 21st annual international conference on Chinese Control and Decision Conference
A note on the limits of collusion-resistant watermarks
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Coin-based anonymous fingerprinting
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
An anonymous buyer-seller watermarking protocol with anonymity control
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
Tracing illegal users of video: reconsideration of tree-specific and endbuyer-specific methods
ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part III
Hyper-elliptic curves based ring signature
IITA'09 Proceedings of the 3rd international conference on Intelligent information technology application
A provably secure anonymous buyer-seller watermarking protocol
IEEE Transactions on Information Forensics and Security
On the implementation of spread spectrum fingerprinting in asymmetric cryptographic protocol
EURASIP Journal on Information Security
Rational enforcement of digital oblivion
Proceedings of the 4th International Workshop on Privacy and Anonymity in the Information Society
An efficient fingerprinting scheme with symmetric and commutative encryption
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
Ring-based anonymous fingerprinting scheme
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
IH'04 Proceedings of the 6th international conference on Information Hiding
Cryptanalysis of a generalized anonymous buyer-seller watermarking protocol of IWDW 2004
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
Flaws in generic watermarking protocols based on zero-knowledge proofs
IWDW'04 Proceedings of the Third international conference on Digital Watermarking
IWDW'04 Proceedings of the Third international conference on Digital Watermarking
An efficient fingerprinting scheme with secret sharing
DRMTICS'05 Proceedings of the First international conference on Digital Rights Management: technologies, Issues, Challenges and Systems
Video fingerprinting system using wavelet and error correcting code
WISA'05 Proceedings of the 6th international conference on Information Security Applications
An asymmetric fingerprinting code for collusion-resistant buyer-seller watermarking
Proceedings of the first ACM workshop on Information hiding and multimedia security
Hi-index | 0.00 |
Fingerprinting schemes deter people from illegally redistributing digital data by enabling the original merchant of the data to identify the original buyer of a redistributed copy. Recently, asymmetric fingerprinting schemes were introduced. Here, only the buyer knows the fingerprinted copy after a sale, and if the merchant finds this copy somewhere, he obtains a proof that it was the copy of this particular buyer. A problem with all previous fingerprinting schemes arises in the context of electronic marketplaces where untraceable electronic cash offers buyers privacy similar to that when buying books or music in normal shops with normal cash. Now buyers would have to identify themselves solely for the purpose of fingerprinting. To remedy this, we introduce and construct anonymous asymmetric fingerprinting schemes, where buyers can buy information anonymously, but can nevertheless be identified if they redistribute this information illegally. A subresult of independent interest is an asymmetric fingerprinting protocol with reasonable collusion tolerance and 2-party trials, which have several practical advantages over the previous 3-party trials. Our results can also be applied to so-called traitor tracing, the equivalent of fingerprinting for broadcast encryption.