Abstract
Fingerprinting schemes enable a merchant to identify the buyer of an illegally distributed digital good by providing each buyer with a slightly different version. Asymmetric fingerprinting schemes further prevent the merchant from framing a buyer by making the fingerprinted version known to the buyer only. In addition, an anonymous fingerprinting scheme allows the buyer to purchase goods without revealing her identity to the merchant. However, as soon as the merchant finds a sold version that has been (illegally) distributed, he is able to retrieve a buyer’s identity and take her to court. This paper proposes a new and more efficient anonymous fingerprinting scheme that uses group signature schemes as a building block. A byproduct of independent interest is an asymmetric fingerprinting scheme that allows so-called two-party trials, which is unmet so far.
Chapter PDF
References
I. Biehl and B. Meyer. Protocols for collusion-secure asymmetric fingerprinting. In Proc. 14th STACS, vol. 1200of LNCS, pp. 213–222. Springer Verlag, 1997.
G. R. Blakley, C. Meadows, and G. B. Prudy. Fingerprinting long forgiving messages. In Advances in Cryptology-CRYPTO’ 85, vol. 218of LNCS, pp. 180–189. Springer-Verlag, 1986.
D. Boneh and J. Shaw. Collusion-secure fingerprinting for digital data. In Advances in Cryptology-CRYPTO’ 95, vol. 963of LNCS, pp. 452–465, 1995.
S. Brands. Electronic cash systems based on the representation problem in groups of prime order. In Preproceedings of Advances in Cryptology-CRYPTO’ 93, pp. 26.1–26.15, 1993.
J. Camenisch and I. Damg∢ad. Verifiable encryption and applications to group signatures and signature sharing. Technical Report RS-98–32, BRICS, Department of Computer Science, University of Aarhus, Dec. 1998.
J. Camenisch and M. Michels. Separability and efficiency for generic group signature schemes. In Advances in Cryptology-CRYPTO’ 99, vol. 1296of LNCS, pp. 413–430. Springer Verlag, 1999.
J. Camenisch and M. Stadler. Efficient group signature schemes for large groups. In Advances in Cryptology-CRYPTO’ 97, vol. 1296of LNCS, pp. 410–424, 1997.
G. Caronni. Assuring ownership rights for digital images. In Verlässliche ITSysteme-VIS’ 95, pp. 251–263. Vieweg Verlag, 1995.
D. Chauman and E. van Heyst. Group signatures. In Advances in Cryptology-EUROCRYPT’ 91, vol. 547 of LNCS, pp. 257–265. Springer-Verlag, 1991.
L. Chen and T. P. Pedersen. New group signature schemes. In Advances in Cryptology-EUROCRYPT’ 94, vol. 950of LNCS, pp. 171–181, 1995.
B. Pfitzmann and A.-R. Sadeghi. Coin-based anonymous fingerprinting. In Advances in Cryptology-EUROCRYPT’ 99, vol. 1592of LNCS, pp. 150–164. Springer Verlag, 1999.
B. Pfitzmann and M. Schunter. Asymmetric fingerprinting. In Advances in Cryptology-EUROCRYPT’ 96, vol. 1070of LNCS, pp. 84–95. Springer Verlag, 1996.
B. Pfitzmann and M. Waidner. Anonymous fingerprinting. In Advances in Cryptology-EUROCRYPT’ 97, vol. 1233of LNCS, pp. 88–102. Springer Verlag, 1997.
B. P. tzmann and M. Waidner. Asymmetric fingerprinting for larger collusions. In 4th ACM CCS, pp. 57–66. ACM press, Apr. 1997.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2000 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Camenisch, J. (2000). Efficient Anonymous Fingerprinting with Group Signatures. In: Okamoto, T. (eds) Advances in Cryptology — ASIACRYPT 2000. ASIACRYPT 2000. Lecture Notes in Computer Science, vol 1976. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44448-3_32
Download citation
DOI: https://doi.org/10.1007/3-540-44448-3_32
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-41404-9
Online ISBN: 978-3-540-44448-0
eBook Packages: Springer Book Archive