Advertisement

Asymmetric Fingerprinting

Extended Abstract
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1070)

Abstract

Fingerprinting schemes deter people from illegal copying of digital data by enabling the merchant of the data to identify the original buyer of a copy that was redistributed illegally. All known fingerprinting schemes are symmetric in the following sense: Both the buyer and the merchant know the fingerprinted copy. Thus, when the merchant finds this copy somewhere, there is no proof that it was the buyer who put it there, and not the merchant.

We introduce asymmetric fingerprinting, where only the buyer knows the fingerprinted copy, and the merchant, upon finding it somewhere, can find out and prove to third parties whose copy it was. We present a detailed definition of this concept and constructions. The first construction is based on a quite general symmetric fingerprinting scheme and general crypto- graphic primitives; it is provably secure if all these underlying schemes are. We also present more specific and more efficient constructions.

Keywords

Signature Scheme Copyright Protection Commitment Scheme Symmetric Scheme Illegal Copy 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. [B87]
    Josh Cohen Benaloh: Verifiable Secret-Ballot Elections; Dissertation, Yale University, September 1987.Google Scholar
  2. [B91]
    Donald Beaver: Secure Multiparty Protocols and Zero Knowledge Proof Systems Tolerating a Faulty Minority; Journal of Cryptology 4/2 (1991) 75–122.CrossRefzbMATHGoogle Scholar
  3. [BCC88]
    Gilles Brassard, David Chaum, Claude Crépeau: Minimum Disclosure Proofs of Knowledge; Journal of Computer and System Sciences 37 (1988) 156–189.CrossRefzbMATHMathSciNetGoogle Scholar
  4. [BLM94]
    J. Brassil, S. Low, N. Maxemchuk, L. O’Gorman: Electronic Marking and Identification Techniques to Discourage Document Copying; Proceedings IEEE INFOCOM 94, Toronto, June 12–16, 1994, 1278–1287.Google Scholar
  5. [BMP86]
    G. R. Blakley, C. Meadows, G. B. Purdy: Fingerprinting Long Forgiving Messages; Crypto’ 85, LNCS 218, Springer-Verlag, Berlin 1986, 180–189.Google Scholar
  6. [BS95]
    Dan Boneh, James Shaw: Collusion-Secure Fingerprinting for Digital Data; Crypto’ 95, LNCS 963, Springer-Verlag, Berlin 1995, 452–465.Google Scholar
  7. [C95]
    Germano Caronni: Assuring Ownership Rights for Digital Images; Proceedings VIS’ 95; Vieweg, Wiesbaden 1995, 251–263.Google Scholar
  8. [CDG88]
    David Chaum, Ivan B. Damgård, Jeroen van de Graaf: Multiparty computations ensuring privacy of each party’s input and correctness of the result; Crypto’ 87, LNCS 293, Springer-Verlag, Berlin 1988, 87–119.Google Scholar
  9. [CF85]
    Josh D. Cohen, Michael J. Fischer: A robust and verifiable cryptographically secure election scheme; 26th FOCS, 1985, 372–382.Google Scholar
  10. [CFN94]
    Benny Chor, Amos Fiat, Moni Naor: Tracing traitors; Crypto’ 94, LNCS 839, Springer-Verlag, Berlin 1994, 257–270.Google Scholar
  11. [CMP95]
    Abhijit K. Choudhury, Nicholas F. Maxemchuk, Sanjoy Paul, Henning G. Schulzrinne: Copyright Protection for Electronic Publishing Over Computer Networks; IEEE Network 9/3 (1995) 12–20.CrossRefGoogle Scholar
  12. [G87]
    Oded Goldreich: Towards a Theory of Software Protection and Simulation by Oblivious RAMs; 19th STOC, 1987, 182–194.Google Scholar
  13. [GMW87]
    Oded Goldreich, Silvio Micali, Avi Wigderson: How to play any mental game — or — a completeness theorem for protocols with honest majority; 19th STOC, 1987, 218–229.Google Scholar
  14. [GP88]
    Jeroen van de Graaf, René Peralta: A simple and secure way to show the validity of your public key; Crypto’ 87, LNCS 293, Springer-Verlag, Berlin 1988, 128–134.Google Scholar
  15. [MQ95]
    Benoit M. Macq, Jean-Jacques Quisquater: Cryptology for Digital TV Broadcasting; Proceedings of the IEEE 83/6 (1995) 944–957.CrossRefGoogle Scholar
  16. [MR91]
    Silvio Micali, Phillip Rogaway: Secure Computation (Chapters 1–3); Laboratory for Computer Science, MIT; distributed at Crypto’ 91.Google Scholar
  17. [O90]
    Rafail Ostrovsky: An efficient software protection scheme; Crypto’ 89, LNCS 435, Springer-Verlag, Heidelberg 1990, 610–611.Google Scholar
  18. [W83]
    Neal R. Wagner: Fingerprinting; IEEE Symposium on Security and Privacy, Oakland, 1983, 18–22.Google Scholar
  19. [Y86]
    Andrew Chi-Chih Yao: How to Generate and Exchange Secrets; 27th FOCS, 1986, 162–167.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1996

Authors and Affiliations

  1. 1.Institut für InformatikUniversität HildesheimHildesheimGermany

Personalised recommendations