An asymmetric traceability scheme for copyright protection without trust assumptions

被引:0
|
作者
Magkos, E
Kotzanikolaou, P
Chrissikopoulos, V
机构
[1] Univ Piraeus, Dept Informat, Piraeus 18534, Greece
[2] Ionian Univ, Dept Archiving & Lib Studies, Corfu 49100, Greece
来源
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Traceability schemes have been proposed as a method to establish copyright protection of broadcast information. With asymmetric traceability, the merchant cannot frame an innocent user, while no user can abuse the system without being detected. We propose an asymmetric solution for traceability, based on the very efficient symmetric scheme of Kurosawa-Desmedt [13]. We do not make any trust assumptions about the broadcasting center or other authorities. Furthermore, we establish anonymity protection for all honest users: the identity of a user is protected, until a "fingerprint" of that user is found on a pirate decoder. We make use of well-known cryptographic techniques, such as oblivious transfer, time-lock puzzles and blind signatures. Finally, we propose a cut-and-choose technique to assure the correctness of the decryption keys.
引用
收藏
页码:186 / 195
页数:10
相关论文
共 50 条
  • [1] PCPT and ACPT: Copyright protection and traceability scheme for DNN models
    Fan, Xuefeng
    Fu, Dahao
    Gui, Hangyu
    Zhou, Xiaoyi
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2025, 89
  • [2] A new asymmetric watermarking scheme for copyright protection
    Gui, GF
    Jiang, LG
    He, C
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2006, E89A (02) : 611 - 614
  • [3] A COPYRIGHT PROTECTION SCHEME BASED ON PDF
    Lin, Hsiu-Feng
    Lu, Li-Wei
    Gun, Chiou-Yueh
    Chen, Chih-Ying
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2013, 9 (01): : 1 - 16
  • [4] A Robust Watermarking Scheme for Copyright Protection
    Singh, Satendra Pal
    Bhatnagar, Gaurav
    PROCEEDINGS OF 3RD INTERNATIONAL CONFERENCE ON COMPUTER VISION AND IMAGE PROCESSING, CVIP 2018, VOL 2, 2020, 1024 : 431 - 443
  • [5] A secure watermarking scheme for copyright protection
    Zhang, JS
    Tian, L
    Tai, HM
    Wang, CJ
    APPLICATIONS OF DIGITAL IMAGE PROCESSING XXVII, PTS 1AND 2, 2004, 5558 : 867 - 873
  • [6] A Copyright Protection Scheme for Multicast Context
    Xu, Youwu
    INFORMATION AND BUSINESS INTELLIGENCE, PT II, 2012, 268 : 742 - 748
  • [7] A robust watermark scheme for copyright protection
    Lin, Chu-Hsing
    Liu, Jung-Chun
    Shih, Chih-Hsiong
    Lee, Yan-Wei
    MUE: 2008 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND UBIQUITOUS ENGINEERING, PROCEEDINGS, 2008, : 132 - 137
  • [8] Copyright protection protocols based on asymmetric watermarking
    Craver, S
    Katzenbeisser, S
    COMMUNICATIONS AND MULTIMEDIA SECURITY ISSUES OF THE NEW CENTURY, 2001, 64 : 159 - 170
  • [9] An asymmetric subspace watermarking method for copyright protection
    Tzeng, J
    Hwang, WL
    Chern, IL
    IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2005, 53 (02) : 784 - 792
  • [10] A New Copyright Protection Scheme with Visual Cryptography
    Park, Geum-Dal
    Yoon, Eun-Jun
    Yoo, Kee-Young
    2008 SECOND INTERNATIONAL CONFERENCE ON FUTURE GENERATION COMMUNICATION AND NETWORKING SYMPOSIA, VOLS 1-5, PROCEEDINGS, 2008, : 156 - +