An asymmetric traceability scheme for copyright protection without trust assumptions

被引:0
|
作者
Magkos, E
Kotzanikolaou, P
Chrissikopoulos, V
机构
[1] Univ Piraeus, Dept Informat, Piraeus 18534, Greece
[2] Ionian Univ, Dept Archiving & Lib Studies, Corfu 49100, Greece
来源
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Traceability schemes have been proposed as a method to establish copyright protection of broadcast information. With asymmetric traceability, the merchant cannot frame an innocent user, while no user can abuse the system without being detected. We propose an asymmetric solution for traceability, based on the very efficient symmetric scheme of Kurosawa-Desmedt [13]. We do not make any trust assumptions about the broadcasting center or other authorities. Furthermore, we establish anonymity protection for all honest users: the identity of a user is protected, until a "fingerprint" of that user is found on a pirate decoder. We make use of well-known cryptographic techniques, such as oblivious transfer, time-lock puzzles and blind signatures. Finally, we propose a cut-and-choose technique to assure the correctness of the decryption keys.
引用
收藏
页码:186 / 195
页数:10
相关论文
共 50 条
  • [31] DIGITAL WATERMARKING SCHEME FOR COPYRIGHT PROTECTION AND TAMPERING DETECTION
    Hsu, Ching-Sheng
    Tu, Shu-Fen
    INTERNATIONAL JOURNAL ON INFORMATION TECHNOLOGIES AND SECURITY, 2019, 11 (01): : 107 - 119
  • [32] A Multipurpose Watermarking Scheme for Image Authentication and Copyright Protection
    Zhu, Congxu
    Hu, Yuping
    PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, 2008, : 930 - +
  • [33] Efficient asymmetric self-enforcement scheme with public traceability
    Komaki, H
    Watanabe, Y
    Hanaoka, G
    Imai, H
    PUBLIC KEY CRYPTOGRAPHY, PROCEEDINGS, 2001, 1992 : 225 - 239
  • [34] An asymmetric watermarking method for copyright protection utilizing dual bases
    Tzeng, T
    Hwang, WL
    Chern, IL
    2005 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP), VOLS 1-5, 2005, : 389 - 392
  • [35] A MULTIPURPOSE AUDIO WATERMARKING SCHEME FOR COPYRIGHT PROTECTION AND CONTENT AUTHENTICATION
    Chen, Ning
    Zhu, Jie
    2008 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOLS 1-4, 2008, : 221 - 224
  • [36] Image distribution method with identifier embedding scheme for copyright protection
    Abe, T
    Fujii, H
    Kushima, K
    Sakurai, N
    ELECTRONICS AND COMMUNICATIONS IN JAPAN PART III-FUNDAMENTAL ELECTRONIC SCIENCE, 2002, 85 (12): : 80 - 88
  • [37] A novel multipurpose watermarking scheme for copyright protection and content authentication
    Fan, Ming-Quan
    Wang, Hong-Xia
    SECOND WORKSHOP ON DIGITAL MEDIA AND ITS APPLICATION IN MUSEUM & HERITAGE, PROCEEDINGS, 2007, : 19 - 24
  • [38] Copyright protection scheme based on chaos and secret sharing techniques
    Lou, DC
    Shieh, JM
    Tso, HK
    OPTICAL ENGINEERING, 2005, 44 (11)
  • [39] On the implementation of a copyright protection scheme using digital image watermarking
    Roy, Subhrajit Sinha
    Basu, Abhishek
    Chattopadhyay, Avik
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (19-20) : 13125 - 13138
  • [40] Audio dual watermarking scheme for copyright protection and content authentication
    Zhang J.
    International Journal of Speech Technology, 2015, 18 (3) : 443 - 448