Fingerprinting long forgiving messages
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
Asymmetric fingerprinting for larger collusions
Proceedings of the 4th ACM conference on Computer and communications security
Protocols for Collusion-Secure Asymmetric Fingerprinting (Extended Abstract)
STACS '97 Proceedings of the 14th Annual Symposium on Theoretical Aspects of Computer Science
Separability and Efficiency for Generic Group Signature Schemes
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Collusion-Secure Fingerprinting for Digital Data (Extended Abstract)
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Efficient Group Signature Schemes for Large Groups (Extended Abstract)
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
Coin-based anonymous fingerprinting
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Anonymous Fingerprinting as Secure as the Bilinear Diffie-Hellman Assumption
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
How to Break a Semi-anonymous Fingerprinting Scheme
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
An Efficient Anonymous Fingerprinting Protocol
Computational Intelligence and Security
Anonymous Fingerprinting for Predelivery of Contents
Information Security and Cryptology --- ICISC 2008
A provably secure anonymous buyer-seller watermarking protocol
IEEE Transactions on Information Forensics and Security
On the implementation of spread spectrum fingerprinting in asymmetric cryptographic protocol
EURASIP Journal on Information Security
Rational enforcement of digital oblivion
Proceedings of the 4th International Workshop on Privacy and Anonymity in the Information Society
On the security and practicality of a buyer seller watermarking protocol for DRM
Proceedings of the 4th international conference on Security of information and networks
Ring-based anonymous fingerprinting scheme
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
Distributed multicast of fingerprinted content based on a rational peer-to-peer community
Computer Communications
Hi-index | 0.00 |
Fingerprinting schemes enable a merchant to identify the buyer of an illegally distributed digital good by providing each buyer with a slightly different version. Asymmetric fingerprinting schemes further prevent the merchant from framing a buyer by making the fingerprinted version known to the buyer only. In addition, an anonymous fingerprinting scheme allows the buyer to purchase goods without revealing her identity to the merchant. However, as soon as the merchant finds a sold version that has been (illegally) distributed, he is able to retrieve a buyer's identity and take her to court. This paper proposes a new and more efficient anonymous fingerprinting scheme that uses group signature schemes as a building block. A byproduct of independent interest is an asymmetric fingerprinting scheme that allows so-called two-party trials, which is unmet so far.