Weakness and Improvements of Yong-Lee's Anonymous Fingerprinting Protocol*This research was supported by the University IT Research Center Project funded by the Korean Ministry of Information and Communication.

  • Authors:
  • Yunho Lee;Seungjoo Kim;Dongho Won

  • Affiliations:
  • The authors are with the Information Security Group, Sungkyunkwan University, 300 Cheoncheon-dong, Jangan-gu, Suwon, Gyeonggi-do 440-746, Korea. E-mail: leeyh@security.re.kr, E-mail: skim@security ...;The authors are with the Information Security Group, Sungkyunkwan University, 300 Cheoncheon-dong, Jangan-gu, Suwon, Gyeonggi-do 440-746, Korea. E-mail: leeyh@security.re.kr, E-mail: skim@security ...;The authors are with the Information Security Group, Sungkyunkwan University, 300 Cheoncheon-dong, Jangan-gu, Suwon, Gyeonggi-do 440-746, Korea. E-mail: leeyh@security.re.kr, E-mail: skim@security ...

  • Venue:
  • IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

In 2005, Yong and Lee proposed a buyer-seller fingerprinting protocol using symmetric and commutative encryptions. They claimed that their protocol was practical and anonymous since they used symmetric and commutative encryptions. However, an attacker can get the content embedded with one or more honest buyers' fingerprints using man-in-the-middle attack. In this letter, we point out the weakness and propose methods for improving to their protocol.