An asymmetric traceability scheme for copyright protection without trust assumptions

被引:0
|
作者
Magkos, E
Kotzanikolaou, P
Chrissikopoulos, V
机构
[1] Univ Piraeus, Dept Informat, Piraeus 18534, Greece
[2] Ionian Univ, Dept Archiving & Lib Studies, Corfu 49100, Greece
来源
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Traceability schemes have been proposed as a method to establish copyright protection of broadcast information. With asymmetric traceability, the merchant cannot frame an innocent user, while no user can abuse the system without being detected. We propose an asymmetric solution for traceability, based on the very efficient symmetric scheme of Kurosawa-Desmedt [13]. We do not make any trust assumptions about the broadcasting center or other authorities. Furthermore, we establish anonymity protection for all honest users: the identity of a user is protected, until a "fingerprint" of that user is found on a pirate decoder. We make use of well-known cryptographic techniques, such as oblivious transfer, time-lock puzzles and blind signatures. Finally, we propose a cut-and-choose technique to assure the correctness of the decryption keys.
引用
收藏
页码:186 / 195
页数:10
相关论文
共 50 条
  • [21] A Novel Copyright Protection Scheme Using Visual Cryptography
    Nag, Amitava
    Singh, Jyoti Prakash
    Biswas, Sushanta
    Sarkar, D.
    Sarkar, Partha Pratim
    ADVANCES IN COMPUTING AND COMMUNICATIONS, PT 2, 2011, 191 : 612 - 619
  • [22] Copyright protection scheme for product data in networked manufacturing
    Chen, Ke
    Hu, Tian-Lei
    Chen, Gang
    Dong, Jin-Xiang
    Jisuanji Jicheng Zhizao Xitong/Computer Integrated Manufacturing Systems, CIMS, 2008, 14 (01): : 183 - 191
  • [23] A copyright protection scheme of images based on visual cryptography
    Chang, CC
    Wu, HC
    IMAGING SCIENCE JOURNAL, 2001, 49 (03): : 141 - 150
  • [24] Yet another wavelet watermarking scheme for copyright protection
    Lee, Narn-Yih
    Wang, Ching-Chun
    9TH IEEE INTERNATIONAL CONFERENCE ON E-COMMERCE TECHNOLOGY/4TH IEEE INTERNATIONAL CONFERENCE ON ENTERPRISE COMPUTING, E-COMMERCE AND E-SERVICES, 2007, : 421 - +
  • [25] A Provable Watermark-based Copyright Protection Scheme
    Ting, Pei-Yih
    Huang, Shao-Da
    Wu, Tzong-Sun
    Lin, Han-Yu
    2015 10TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS), 2015, : 124 - 129
  • [26] An image copyright protection scheme based on torus automorphism
    Chang, CC
    Hsiao, JY
    Chiang, CL
    FIRST INTERNATIONAL SYMPOSIUM ON CYBER WORLDS, PROCEEDINGS, 2002, : 217 - 224
  • [27] On the security of a copyright protection scheme based on visual cryptography
    Chen, Tzung-Her
    Chang, Chin-Chen
    Wu, Chang-Sian
    Lou, Der-Chyuan
    COMPUTER STANDARDS & INTERFACES, 2009, 31 (01) : 1 - 5
  • [28] A novel edge based image copyright protection scheme
    Li, KF
    Chen, TS
    Cheng, SC
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON IMAGING SCIENCE, SYSTEMS AND TECHNOLOGY, VOLS I AND II, 2001, : 267 - 273
  • [29] Fuzzy Neural Based Copyright Protection Scheme for Superresolution
    Raval, Mehul S.
    Joshi, M. V.
    Kher, Shubhalaxmi
    2013 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC 2013), 2013, : 328 - 332
  • [30] Novel watermarking scheme with watermark encryption for copyright protection
    Joe, Sebastin Antony S.
    Christopher, Seldev
    Mary, Jereesha S. J.
    BIOMEDICAL RESEARCH-INDIA, 2017, 28 (01): : 51 - 57