Anonymous Fingerprinting as Secure as the Bilinear Diffie-Hellman Assumption

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 380
  • Download : 50
DC FieldValueLanguage
dc.contributor.authorKim, Myungsun-
dc.contributor.authorKim, Jongseong-
dc.contributor.authorKim, Kwangjo-
dc.date.accessioned2011-07-06T07:45:42Z-
dc.date.available2011-07-06T07:45:42Z-
dc.date.issued2002-
dc.identifier.citationICICSen
dc.identifier.urihttp://hdl.handle.net/10203/24472-
dc.description.abstractThe illegal copying and redistribution of digitally-stored information is a crucial problem to distributors who electronically sell digital data. Fingerprinting provides a means which a copyright owner can trace illegal redistributors of electronic information. Various fingerprinting schemes have appeared as techniques for copyright protection from symmetric fingerprinting by Boneh and Shaw [3], asymmetric fingerprinting by Pfitzmann and Schunter [14], and anonymous fingerprinting by Pfitzmann and Waidner [15]. In most of previous schemes, the computational capability of clients has been assumed to roughly be equal to each other and even to their servers. In particular, the key size of known algorithms for fingerprinting schemes keeps back from their practical implementation. In this paper, we propose a scheme for anonymous fingerprinting based on the bilinear Diffie-Hellman problem and prove its security. Our scheme exhibits all computations are performed more efficiently than previous schemes and the key size is quite reasonable for practical use.en
dc.language.isoen_USen
dc.publisherSpringer Verlagen
dc.subjectAnonymous-asymmetric and symmetric fingerprintingen
dc.subjectBilinear Diffie-Hellman problemen
dc.subjectIntellectual property protectionen
dc.subjectSecurity reductionen
dc.titleAnonymous Fingerprinting as Secure as the Bilinear Diffie-Hellman Assumptionen
dc.typeArticleen
Appears in Collection
CS-Journal Papers(저널논문)

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0