Fingerprinting long forgiving messages
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
A New Identification Scheme Based on the Bilinear Diffie-Hellman Problem
ACISP '02 Proceedings of the 7th Australian Conference on Information Security and Privacy
ICISC '00 Proceedings of the Third International Conference on Information Security and Cryptology
Efficient Smart-Card Based Anonymous Fingerprinting
CARDIS '98 Proceedings of the The International Conference on Smart Card Research and Applications
Identity-Based Encryption from the Weil Pairing
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Multiparty Computations Ensuring Privacy of Each Party's Input and Correctness of the Result
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
Collusion-Secure Fingerprinting for Digital Data (Extended Abstract)
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
A New Anonymous Fingerprinting Scheme with High Enciphering Rate
INDOCRYPT '01 Proceedings of the Second International Conference on Cryptology in India: Progress in Cryptology
Efficient Anonymous Fingerprinting with Group Signatures
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Short Signatures from the Weil Pairing
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Secure Fingerprinting Using Public-Key Cryptography (Position Paper)
Proceedings of the 6th International Workshop on Security Protocols
How to Break a Semi-anonymous Fingerprinting Scheme
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Anonymous Fingerprinting Based on Committed Oblivious Transfer
PKC '99 Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
An Efficient Anonymous Fingerprinting Protocol
Computational Intelligence and Security
Hi-index | 0.00 |
The illegal copying and redistribution of digitally-stored information is a crucial problem to distributors who electronically sell digital data. Fingerprinting provides a means which a copyright owner can trace illegal redistributors of electronic information. Various fingerprinting schemes have appeared as techniques for copyright protection from symmetric fingerprinting by Boneh and Shaw [3], asymmetric fingerprinting by Pfitzmann and Schunter [14], and anonymous fingerprinting by Pfitzmann and Waidner [15]. In most of previous schemes, the computational capability of clients has been assumed to roughly be equal to each other and even to their servers. In particular, the key size of known algorithms for fingerprinting schemes keeps back from their practical implementation. In this paper, we propose a scheme for anonymous fingerprinting based on the bilinear Diffie-Hellman problem and prove its security. Our scheme exhibits all computations are performed more efficiently than previous schemes and the key size is quite reasonable for practical use.