Asymmetric Fingerprinting ( Extended

نویسندگان

  • Birgit Pfitzmann
  • Matthias Schunter
چکیده

Fingerprinting schemes deter people from illegal copying of digital data by enabling the merchant of the data to identify the original buyer of a copy that was redistributed illegally. All known fingerprinting schemes are symmetric in the following sense: Both the buyer and the merchant know the fingerprinted copy. Thus, when the merchant finds this copy somewhere, there is no proof that it was the buyer who put it there, and not the merchant. We introduce asymmetric fingerprinting, where only the buyer knows the fingerprinted copy, and the merchant, upon finding it somewhere, can find out and prove to third parties whose copy it was. We present a detailed definition of this concept and constructions. The first construction is based on a quite general symmetric fingerprinting scheme and general cryptographic primitives; it is provably secure if all these underlying schemes are. We also present more specific and more efficient constructions.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Communication Optimal Tardos-Based Asymmetric Fingerprinting

Asymmetric fingerprinting schemes — introduced by Pfitzmann and Schunter in Eurocrypt 1996 — enable the transmission of a file stored in a server to a set of users so that each user obtains a variation of the file. The security considerations of these schemes are as follows: if any (appropriately bounded) subset of users collude to produce a “pirate” copy of the file, it is always possible for ...

متن کامل

Practical Asymmetric Fingerprinting with a TTP

Fingerprinting schemes allow tracing of illegally redistributed multimedia contents. When using asymmetric fingerprinting, the merchant does not know the marked copy nor the embedded mark, so fraudulent distribution of the content by the merchant –which could lead to framing honest customers– is not possible. A problem with the deployment of classical asymmetric fingerprinting protocols is that...

متن کامل

Anonymous Fingerprinting

Fingerprinting schemes deter people from illegally redistributing digital data by enabling the original merchant of the data to identify the original buyer of a redistributed copy. Recently, asymmetric fingerprinting schemes were introduced. Here, only the buyer knows the fingerprinted copy after a sale, and if the merchant finds this copy somewhere, he obtains a proof that it was the copy of t...

متن کامل

The Asymmetric Effects of Energy Consumption on Growth of Iran's Agricultural Sector Using Non-Linear Extended Lag Self-Regression (NARDL)

    Energy is one of the factors used in most economic activities. The economic security of most countries depends on secure access to energy. Therefore, the production and consumption of energy and its optimal use are of particular importance. The purpose of this study is to investigate the relationship between energy consumption and economic growth in the framework of nonlinear self-regressi...

متن کامل

Effects of asymmetric stiffness on parametric instabilities of rotor

This work deals with effects of asymmetric stiffness on the dynamic behaviour of the rotor system. The analysis is presented through an extended Lagrangian Hamiltonian mechanics on the asymmetric rotor system, where symmetries are broken in terms of the rotor stiffness. The complete dynamics of asymmetries of rotor system is investigated with a case study. In this work, a mathematical model is ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1996