How to Break COT-Based Fingerprinting Schemes and Design New One
نویسندگان
چکیده
Digital fingerprinting schemes are cryptographic methods deterring buyers from illegally redistributing digital contents. It enables sellers to identify the traitor by providing each buyer with a slight different version. What is important in designing fingerprinting scheme is to make it more practical and efficient. Recently, two oblivious transfer protocolbased schemes to consider practicality were proposed. These are significant in the sense that they are completely specified from a computation point of view and are thus readily implementable. But these schemes cannot offer the security of sellers and buyers. In this paper, we show how to break the existing oblivious transfer-based fingerprinting schemes and then suggest how to make secure fingerprinting schemes against the dishonesty of sellers and buyers. We use oblivious transfer protocol with two-lock cryptosystem to make it practical and secure. All computations are performed efficiently and the security degree is strengthened in our proposal. key words: fingerprinting, committed oblivious transfer protocol, two-lock cryptosystem
منابع مشابه
Meeting the Challenge of the “Know-Do” Gap; Comment on “CIHR Health System Impact Fellows: Reflections on ‘Driving Change’ Within the Health System”
Bridging the ‘know-do’ gap is not new but considerably greater attention is being focused on the issue as governments and research funders seek to demonstrate value for money and impact on policy and practice. Initiatives like the Canadian Institutes of Health Research (CIHR) Health System Impact (HSI) Fellowship are therefore both timely and welcome. However, they conf...
متن کاملNew Shewhart-type synthetic bar{X} control schemes for non-normal data
In this paper, Burr-type XII ̄X synthetic schemes are proposed as an alternative to the classical ̄X synthetic schemes when the assumption of normality fails to hold. First, the basic design of the Burr-type XII ̄X synthetic scheme is developed and its performance investigated using exact formulae. Secondly, the non-side-sensitive and side-sensitive Burr-type XII ̄X synthetic schemes are int...
متن کاملA survey on digital data hiding schemes: principals, algorithms, and applications
This paper investigates digital data hiding schemes. The concept of information hiding will be explained at first, and its traits, requirements, and applications will be described subsequently. In order to design a digital data hiding system, one should first become familiar with the concepts and criteria of information hiding. Having knowledge about the host signal, which may be audio, image, ...
متن کاملDesign and Validation of Decentering Schemes for Decision-Making about Curriculum Based on Schwab’s Theory and Features of the Curriculum Development System in Iran
Aim: the present study aimed to design and validate decentering schemes for decision making about curriculum based on Schwab’s practical theory and features of the educational system in Iran. Method: in the first step, qualitative methods of "Speculative Essay", "Evaluative Inquiry: Situational Assessment", and "Integrative Inquiry: The Research Synthesis" were employed to explain decentering ...
متن کاملEconomic-statistical Design of NP Control Chart with Variable Sample Size and Sampling Interval
The control charts are graphical tools and proven techniques to improve the performance of a process. Usually, the processes are not naturally controlled, so the use of control charts will help to reduce the variability and increase the stability of the process. In the traditional approach, control charts with fix sample size and constant sampling intervals were used to identify the changes in ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IEICE Transactions
دوره 88-A شماره
صفحات -
تاریخ انتشار 2005