Analysis of COT-based fingerprinting schemes: new approach to design practical and secure fingerprinting scheme

  • Authors:
  • Jae-Gwi Choi;Ji-Hwan Park;Ki-Ryong Kwon

  • Affiliations:
  • Department of Information Security, Pukyong National University, Busan, Korea;Department of Information Security, Pukyong National University, Busan, Korea;Department of Electronic and Computer Engineering, Pusan University of Foreign Studies, Busan, Korea

  • Venue:
  • IH'04 Proceedings of the 6th international conference on Information Hiding
  • Year:
  • 2004

Quantified Score

Hi-index 0.00

Visualization

Abstract

Digital fingerprinting schemes deter people from illegal copying of digital contents by enabling the seller to identify the original buyer of a copy that was redistributed illegally. What is important in designing fingerprinting scheme is to make it more practical and efficient. However, the complexity of existing schemes is too high to be implementable. Recently, oblivious transfer protocol-based schemes to consider practicality were proposed. These are significant in the sense that there are completely specified from a computation point of view and are thus readily implementable. But these schemes have the serious problem that they cannot offer the security of sellers and buyers. In this paper, we first show how to break the existing oblivious transfer-based fingerprinting schemes and then suggest how to make secure fingerprinting schemes against the dishonesty of a sellers and buyers. We use oblivious transfer protocol with two-lock cryptosystem to make it practical and secure. All computations are performed efficiently and the security degree is strengthened in our proposal.