DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kim, Myungsun | ko |
dc.contributor.author | Kim, Jongseong | ko |
dc.contributor.author | Kim, Kwangjo | ko |
dc.date.accessioned | 2013-03-05T04:03:46Z | - |
dc.date.available | 2013-03-05T04:03:46Z | - |
dc.date.created | 2012-02-06 | - |
dc.date.created | 2012-02-06 | - |
dc.date.issued | 2002 | - |
dc.identifier.citation | INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.2513, pp.97 - 108 | - |
dc.identifier.issn | 0302-9743 | - |
dc.identifier.uri | http://hdl.handle.net/10203/85377 | - |
dc.description.abstract | The illegal copying and redistribution of digitally-stored information is a crucial problem to distributors who electronically sell digital data. Fingerprinting provides a means which a copyright owner can trace illegal redistributors of electronic information. Various fingerprinting schemes have appeared as techniques for copyright protection from symmetric fingerprinting by Boneh and Shaw [3], asymmetric fingerprinting by Pfitzmann and Schunter [14], and anonymous fingerprinting by Pfitzmann and Waidner [15]. In most of previous schemes, the computational capability of clients has been assumed to roughly be equal to each other and even to their servers. In particular, the key size of known algorithms for fingerprinting schemes keeps back from their practical implementation. In this paper, we propose a scheme for anonymous fingerprinting based on the bilinear Diffie-Hellman problem and prove its security. Our scheme exhibits all computations are performed more efficiently than previous schemes and the key size is quite reasonable for practical use. | - |
dc.language | English | - |
dc.publisher | SPRINGER-VERLAG BERLIN | - |
dc.title | Anonymous fingerprinting as secure as the bilinear Diffie-Hellman assumption | - |
dc.type | Article | - |
dc.identifier.wosid | 000182802800009 | - |
dc.type.rims | ART | - |
dc.citation.volume | 2513 | - |
dc.citation.beginningpage | 97 | - |
dc.citation.endingpage | 108 | - |
dc.citation.publicationname | INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE | - |
dc.contributor.localauthor | Kim, Kwangjo | - |
dc.contributor.nonIdAuthor | Kim, Myungsun | - |
dc.contributor.nonIdAuthor | Kim, Jongseong | - |
dc.type.journalArticle | Article; Proceedings Paper | - |
dc.subject.keywordAuthor | anonymous | - |
dc.subject.keywordAuthor | asymmetric | - |
dc.subject.keywordAuthor | and symmetric fingerprinting | - |
dc.subject.keywordAuthor | bilinear | - |
dc.subject.keywordAuthor | Diffie-Hellman problem | - |
dc.subject.keywordAuthor | intellectual property protection | - |
dc.subject.keywordAuthor | security | - |
dc.subject.keywordAuthor | reduction | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.