Efficient Smart-Card Based Anonymous Fingerprinting
نویسندگان
چکیده
Thwarting unlawful redistribution of information sold electronically is a major problem of information-based electronic commerce. Anonymous fingerprinting has appeared as a technique for copyright protection which is compatible with buyer anonymity in electronic transactions. However, the complexity of known algorithms for anonymous fingerprinting is too high for practical implementation on standard computers, let alone smart cards. A scheme for anonymous fingerprinting is presented in this paper where all buyer computations can be performed by the buyer’s smart card.
منابع مشابه
Eecient Smart-card Based Anonymous Fingerprinting ?
Thwarting unlawful redistribution of information sold electronically is a major problem of information-based electronic commerce. Anonymous ngerprinting has appeared as a technique for copyright protection which is compatible with buyer anonymity in electronic transactions. However, the complexity of known algorithms for anonymous ngerprinting is too high for practical implementation on standar...
متن کاملEfficient U-Prove Implementation for Anonymous Credentials on Smart Cards
In this paper we discuss an efficient implementation of anonymous credentials on smart cards. In general, privacy-preserving protocols are computationally intensive and require the use of advanced cryptography. Implementing such protocols for smart cards involves a trade-off between the requirements of the protocol and the capabilities of the smart card. In this context we concentrate on the im...
متن کاملNotes on "An Anonymous Multi-server Authenticated Key Agreement Scheme Based on Trust Computing Using Smart Card and Biometrics"
Nowadays, multi-server remote user authentication schemes have been studied extensively in the literature. Recently, Chuang and Chen proposed a multi-server authentication scheme based on trust computing using smart cards and biometrics. Their scheme is more efficient and can achieve more security requirements than other related schemes. However, we found that Chuang and Chen’s scheme can discl...
متن کاملA robust smart card-based anonymous user authentication protocol for wireless communications
Anonymous user authentication is an important but challenging task for wireless communications. In a recent paper, Das proposed a smart card-based anonymous user authentication protocol for wireless communications. The scheme can protect user privacy and is believed to be secure against a range of network attacks even if the secret information stored in the smart card is compromised. In this pa...
متن کاملEfficient and Anonymous Two-Factor User Authentication in Wireless Sensor Networks: Achieving User Anonymity with Lightweight Sensor Computation
A smart-card-based user authentication scheme for wireless sensor networks (hereafter referred to as a SCA-WSN scheme) is designed to ensure that only users who possess both a smart card and the corresponding password are allowed to gain access to sensor data and their transmissions. Despite many research efforts in recent years, it remains a challenging task to design an efficient SCA-WSN sche...
متن کامل