How to Break a Semi-anonymous Fingerprinting Scheme

  • Ahmad-Reza Sadeghi
Conference paper

DOI: 10.1007/3-540-45496-9_28

Part of the Lecture Notes in Computer Science book series (LNCS, volume 2137)
Cite this paper as:
Sadeghi AR. (2001) How to Break a Semi-anonymous Fingerprinting Scheme. In: Moskowitz I.S. (eds) Information Hiding. IH 2001. Lecture Notes in Computer Science, vol 2137. Springer, Berlin, Heidelberg

Abstract

Fingerprinting schemes are techniques applied to protect the copyright on digital goods. They enable the merchants to identify the source of illegal redistribution. Anonymous fingerprinting schemes allow the buyers to purchase fingerprinted digital goods anonymously. However, on illegal redistribution the anonymity can be revoked.

In this paper we show serious shortcomings of two recent proposals on anonymous fingerprinting schemes. These schemes offer buyers only a weak form of anonymity and allow the merchants to cheat honest buyers. We clarify the notations of anonymity and fingerprinting and make several constructive proposals to repair some of the flaws.

Keywords

Copyright Protection Anonymity Fingerprinting Oblivious Transfer 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag Berlin Heidelberg 2001

Authors and Affiliations

  • Ahmad-Reza Sadeghi
    • 1
  1. 1.Fachbereich InformatikUniversität des SaarlandesSaarbrückenGermany

Personalised recommendations