Coin-Based Anonymous Fingerprinting
نویسندگان
چکیده
Fingerprinting schemes are technical means to discourage people from illegally redistributing the digital data they have legally purchased. These schemes enable the original merchant to identify the original buyer of the digital data. In so-called asymmetric fingerprinting schemes the fingerprinted data item is only known to the buyer after a sale and if the merchant finds an illegally redistributed copy, he obtains a proof convincing a third party whom this copy belonged to. All these fingerprinting schemes require the buyers to identify themselves just for the purpose of fingerprinting and thus offer the buyers no privacy. Hence anonymous asymmetric fingerprinting schemes were introduced, which preserve the anonymity of the buyers as long as they do not redistribute the data item. In this paper a new anonymous fingerprinting scheme based on the principles of digital coins is introduced. The construction replaces the general zero-knowledge techniques from the known certificate-based construction by explicit protocols, thus bringing anonymous fingerprinting far nearer
منابع مشابه
Coin-based Anonymous Fingerprinting Scheme with Automatic Identification of Redistributors
As the markets of digital contents over computer networks become more popular, illegal redistribution of contents by a buyer becomes the more serious problem. To deter illegal redistribution, various fingerprinting schemes have been proposed. The fingerprinting schemes enable merchants to embed information which identifies the original buyer to the purchased content. Identifying the original bu...
متن کاملAnonymous Fingerprinting with Direct Non-repudiation
Fingerprinting schemes support copyright protection by enabling the merchant of a data item to identify the original buyer of a redistributed copy. In asymmetric schemes, the merchant can also convince an arbiter of this fact. Anonymous fingerprinting schemes enable buyers to purchase digital items anonymously; however, identification is possible if they redistribute the data item. Recently, a ...
متن کاملAnonymous Fingerprinting Based on Committed Oblivious Transfer
Thwarting unlawful redistribution of information sold electronically is a major problem of information-based electronic commerce. Anonymous fingerprinting has appeared as a technique for copyright protection which is compatible with buyer anonymity in electronic transactions. However, the complexity of known algorithms for anonymous fingerprinting deters their practical implementation, since th...
متن کاملEfficient Smart-Card Based Anonymous Fingerprinting
Thwarting unlawful redistribution of information sold electronically is a major problem of information-based electronic commerce. Anonymous fingerprinting has appeared as a technique for copyright protection which is compatible with buyer anonymity in electronic transactions. However, the complexity of known algorithms for anonymous fingerprinting is too high for practical implementation on sta...
متن کاملMaster ’ s Thesis Robust Anonymous Fingerprinting
Fingerprinting is an essential tool to shun legal buyers of digital content from illegal redistribution. In fingerprinting schemes, the merchant embeds the buyer’s identity as a watermark into the content, so that the merchant can retrieve the buyer’s identity when he encounters a redistributed copy. To prevent the merchant from dishonestly embedding the buyer’s identity multiple times, it is e...
متن کامل