Anonymous fingerprinting as secure as the bilinear Diffie-Hellman assumption

被引:0
|
作者
Kim, M [1 ]
Kim, J [1 ]
Kim, K [1 ]
机构
[1] ICU, IRIS, Int Res Ctr Informat Secur, Yuseong Gu, Taejon 305732, South Korea
关键词
anonymous; asymmetric; and symmetric fingerprinting; bilinear; Diffie-Hellman problem; intellectual property protection; security; reduction;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The illegal copying and redistribution of digitally-stored information is a crucial problem to distributors who electronically sell digital data. Fingerprinting provides a means which a copyright owner can trace illegal redistributors of electronic information. Various fingerprinting schemes have appeared as techniques for copyright protection from symmetric fingerprinting by Boneh and Shaw [3], asymmetric fingerprinting by Pfitzmann and Schunter [14], and anonymous fingerprinting by Pfitzmann and Waidner [15]. In most of previous schemes, the computational capability of clients has been assumed to roughly be equal to each other and even to their servers. In particular, the key size of known algorithms for fingerprinting schemes keeps back from their practical implementation. In this paper, we propose a scheme for anonymous fingerprinting based on the bilinear Diffie-Hellman problem and prove its security. Our scheme exhibits all computations are performed more efficiently than previous schemes and the key size is quite reasonable for practical use.
引用
收藏
页码:97 / 108
页数:12
相关论文
共 50 条
  • [1] Secure bilinear Diffie-Hellman bits
    Galbraith, SD
    Hopkins, HJ
    Shparlinski, IE
    [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2004, 3108 : 370 - 378
  • [2] The Kernel Matrix Diffie-Hellman Assumption
    Morillo, Paz
    Rafols, Carla
    Villar, Jorge L.
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT I, 2016, 10031 : 729 - 758
  • [3] The Decision Diffie-Hellman assumption and the Quadratic Residuosity assumption
    Saito, T
    Koshiba, T
    Yamamura, A
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2001, E84A (01): : 165 - 171
  • [4] Decision Diffie-Hellman assumption and the Quadratic Residuosity assumption
    Saito, Taiichi
    Koshiba, Takeshi
    Yamamura, Akihiro
    [J]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2001, E84-A (01) : 165 - 171
  • [5] Polynomial approximation of bilinear Diffie-Hellman maps
    Blake, Ian F.
    Garefalakis, Theo
    [J]. FINITE FIELDS AND THEIR APPLICATIONS, 2008, 14 (02) : 379 - 389
  • [6] A Secure and Efficient Authenticated Diffie-Hellman Protocol
    Sarr, Augustin P.
    Elbaz-Vincent, Philippe
    Bajard, Jean-Claude
    [J]. PUBLIC KEY INFRASTRUCTURES, SERVICES AND APPLICATIONS, 2010, 6391 : 83 - +
  • [7] On Several Verifiable Random Functions and the q-decisional Bilinear Diffie-Hellman Inversion Assumption
    Lauer, Sebastian
    [J]. APKC'18: PROCEEDINGS OF THE 5TH ACM ASIA PUBLIC-KEY CRYPTOGRAPHY WORKSHOP, 2018, : 45 - 51
  • [8] Diffie-Hellman, decision Diffie-Hellman, and discrete logarithms
    Maurer, U
    Wolf, S
    [J]. 1998 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY - PROCEEDINGS, 1998, : 327 - 327
  • [9] TMQV: A Strongly eCK-Secure Diffie-Hellman Protocol without Gap Assumption
    Pan, Jiaxin
    Wang, Libin
    [J]. PROVABLE SECURITY, 2011, 6980 : 380 - 388
  • [10] Laconic Branching Programs from the Diffie-Hellman Assumption
    Craig, Sanjam
    Hajiabadi, Mohammad
    Miao, Peihan
    Murphy, Alice
    [J]. PUBLIC-KEY CRYPTOGRAPHY, PT III, PKC 2024, 2024, 14603 : 323 - 355