Fingerprinting long forgiving messages
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
Asymmetric fingerprinting for larger collusions
Proceedings of the 4th ACM conference on Computer and communications security
Information Hiding Techniques for Steganography and Digital Watermarking
Information Hiding Techniques for Steganography and Digital Watermarking
Protocols for Collusion-Secure Asymmetric Fingerprinting (Extended Abstract)
STACS '97 Proceedings of the 14th Annual Symposium on Theoretical Aspects of Computer Science
An Efficient Public Key Traitor Tracing Scheme
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Multiparty Computations Ensuring Privacy of Each Party's Input and Correctness of the Result
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Collusion-Secure Fingerprinting for Digital Data (Extended Abstract)
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '98 Proceedings of the 18th Annual International Cryptology Conference on Advances in Cryptology
Modeling Cryptographic Protocols and Their Collusion Analysis
Proceedings of the First International Workshop on Information Hiding
Proceedings of the First International Workshop on Information Hiding
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
An improved protocol for demonstrating possession of discrete logarithms and some generalizations
EUROCRYPT'87 Proceedings of the 6th annual international conference on Theory and application of cryptographic techniques
Coin-based anonymous fingerprinting
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Anonymous Fingerprinting as Secure as the Bilinear Diffie-Hellman Assumption
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
An Efficient Anonymous Fingerprinting Protocol
Computational Intelligence and Security
Hi-index | 0.00 |
The proposed scheme by Domingo in Electronic Letters presented the first anonymous fingerpritning scheme in which help of a registration center is not required in order to identify redistributors. However, registration protocol of this scheme is 4-pass and identification process also required many exponential operations. In this paper, we propose more efficient protocol than the scheme by Domingo, which require 2-pass in registration protocol and need only 3+1 times exponential operation in identification process. In the electronic commerce of digital contents, registration protocol is more efficient than the previous scheme introduced. Moreover, computational complexity is diminished since identification process requires only 3+1 time exponential operations as the previous one requires 3+N/2 exponential operations. We now show efficient anonymous fingerprinting of electronic information with improved automatic identification of redistributors.