How to Break COT-Based Fingerprinting Schemes and Design New One

نویسندگان

  • JaeGwi Choi
  • Goichiro Hanaoka
  • KyungHyune Rhee
  • Hideki Imai
چکیده

Digital fingerprinting schemes are cryptographic methods deterring buyers from illegally redistributing digital contents. It enables sellers to identify the traitor by providing each buyer with a slight different version. What is important in designing fingerprinting scheme is to make it more practical and efficient. Recently, two oblivious transfer protocolbased schemes to consider practicality were proposed. These are significant in the sense that they are completely specified from a computation point of view and are thus readily implementable. But these schemes cannot offer the security of sellers and buyers. In this paper, we show how to break the existing oblivious transfer-based fingerprinting schemes and then suggest how to make secure fingerprinting schemes against the dishonesty of sellers and buyers. We use oblivious transfer protocol with two-lock cryptosystem to make it practical and secure. All computations are performed efficiently and the security degree is strengthened in our proposal. key words: fingerprinting, committed oblivious transfer protocol, two-lock cryptosystem

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Meeting the Challenge of the “Know-Do” Gap; Comment on “CIHR Health System Impact Fellows: Reflections on ‘Driving Change’ Within the Health System”

Bridging the ‘know-do’ gap is not new but considerably greater attention is being focused on the issue as governments and research funders seek to demonstrate value for money and impact on policy and practice. Initiatives like the Canadian Institutes of Health Research (CIHR) Health System Impact (HSI) Fellowship are therefore both timely and welcome. However, they conf...

متن کامل

New Shewhart-type synthetic bar{X} control schemes for non-normal data

In this paper, Burr-type XII ̄X synthetic schemes are proposed as an alternative to the classical ̄X synthetic schemes when the assumption of normality fails to hold. First, the basic design of the Burr-type XII ̄X synthetic scheme is developed and its performance investigated using exact formulae. Secondly, the non-side-sensitive and side-sensitive Burr-type XII ̄X synthetic schemes are int...

متن کامل

A survey on digital data hiding schemes: principals, algorithms, and applications

This paper investigates digital data hiding schemes. The concept of information hiding will be explained at first, and its traits, requirements, and applications will be described subsequently. In order to design a digital data hiding system, one should first become familiar with the concepts and criteria of information hiding. Having knowledge about the host signal, which may be audio, image, ...

متن کامل

Design and Validation of Decentering Schemes for Decision-Making about Curriculum Based on Schwab’s Theory and Features of the Curriculum Development System in Iran

Aim: the present study aimed to design and validate decentering schemes for decision making about curriculum based on Schwab’s practical theory and features of the educational system in Iran. Method: in the first step, qualitative methods of "Speculative Essay", "Evaluative Inquiry: Situational Assessment", and "Integrative Inquiry: The Research Synthesis" were employed to explain decentering ...

متن کامل

Economic-statistical Design of NP Control Chart with Variable Sample Size and Sampling Interval

The control charts are graphical tools and proven techniques to improve the performance of a process. Usually, the processes are not naturally controlled, so the use of control charts will help to reduce the variability and increase the stability of the process. In the traditional approach, control charts with fix sample size and constant sampling intervals were used to identify the changes in ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IEICE Transactions

دوره 88-A  شماره 

صفحات  -

تاریخ انتشار 2005