Anonymous fingerprinting as secure as the bilinear Diffie-Hellman assumption

被引:0
|
作者
Kim, M [1 ]
Kim, J [1 ]
Kim, K [1 ]
机构
[1] ICU, IRIS, Int Res Ctr Informat Secur, Yuseong Gu, Taejon 305732, South Korea
关键词
anonymous; asymmetric; and symmetric fingerprinting; bilinear; Diffie-Hellman problem; intellectual property protection; security; reduction;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The illegal copying and redistribution of digitally-stored information is a crucial problem to distributors who electronically sell digital data. Fingerprinting provides a means which a copyright owner can trace illegal redistributors of electronic information. Various fingerprinting schemes have appeared as techniques for copyright protection from symmetric fingerprinting by Boneh and Shaw [3], asymmetric fingerprinting by Pfitzmann and Schunter [14], and anonymous fingerprinting by Pfitzmann and Waidner [15]. In most of previous schemes, the computational capability of clients has been assumed to roughly be equal to each other and even to their servers. In particular, the key size of known algorithms for fingerprinting schemes keeps back from their practical implementation. In this paper, we propose a scheme for anonymous fingerprinting based on the bilinear Diffie-Hellman problem and prove its security. Our scheme exhibits all computations are performed more efficiently than previous schemes and the key size is quite reasonable for practical use.
引用
收藏
页码:97 / 108
页数:12
相关论文
共 50 条
  • [21] The Diffie-Hellman protocol
    Maurer, UM
    Wolf, S
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2000, 19 (2-3) : 147 - 171
  • [22] Anonymous Attestation Using the Strong Diffie Hellman Assumption Revisited
    Camenisch, Jan
    Drijvers, Manu
    Lehmann, Anja
    [J]. TRUST AND TRUSTWORTHY COMPUTING, (TRUST 2106), 2016, 9824 : 1 - 20
  • [23] Strongly Secure Authenticated Key Exchange without NAXOS' Approach under Computational Diffie-Hellman Assumption
    Kim, Minkyu
    Fujioka, Atsushi
    Ustaoglu, Berkant
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2012, E95A (01) : 29 - 39
  • [24] Chosen-Ciphertext Secure Identity-Based Encryption from Computational Bilinear Diffie-Hellman
    Galindo, David
    [J]. PAIRING-BASED CRYPTOGRAPHY-PAIRING 2010, 2010, 6487 : 367 - 376
  • [25] Separating decision Diffie-Hellman from computational Diffie-Hellman in cryptographic groups
    Joux, A
    Nguyen, K
    [J]. JOURNAL OF CRYPTOLOGY, 2003, 16 (04) : 239 - 247
  • [27] On the index of the Diffie-Hellman mapping
    Isik, Leyla
    Winterhof, Arne
    [J]. APPLICABLE ALGEBRA IN ENGINEERING COMMUNICATION AND COMPUTING, 2022, 33 (05) : 587 - 595
  • [28] The group Diffie-Hellman problems
    Bresson, E
    Chevassut, O
    Pointcheval, D
    [J]. SELECTED AREAS IN CRYPTOGRAPHY, 2003, 2595 : 325 - 338
  • [29] Provably secure authenticated group Diffie-Hellman key exchange
    Bresson, Emmanuel
    Chevassut, Olivier
    Pointcheval, David
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2007, 10 (03)
  • [30] Circular-secure encryption from decision Diffie-Hellman
    Boneh, Dan
    Halevi, Shai
    Hamburg, Mike
    Ostrovsky, Rafail
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2008, PROCEEDINGS, 2008, 5157 : 108 - +