Abstract
Fingerprinting schemes support copyright protection by enabling the merchant of a data item to identifythe original buyer of a redistributed copy. In asymmetric schemes, the merchant can also convince an arbiter of this fact. Anonymous fingerprinting schemes allow buyers to purchase digital items anonymously; however, identification is possible if theyre distribute the data item.
In this paper, we present an equallyefficient anonymous fingerprinting scheme with direct non-repudiation. The main technique we use, delayed verifiable encryption, is related to coin tracing in escrowed cash systems. However, there are technical differences, mainlyt to provide an unforgeable link to license conditions.
Chapter PDF
References
Ernest Brickell, Peter Gemmell, David Kravitz: Trustee-based Tracing Extensions to Anonymous Cash and the Making of Anonymous Change; SODA 1995, ACM Press, New York 1995, 457–466.
Ingrid Biehl, Bernd Meyer: Protocols for Collusion-Secure Asymmetric Fingerprinting; STACS 97, LNCS 1200, Springer-Verlag, Berlin 1997, 399–412.
G. R. Blakley, Catherine Meadows, George B. Purdy: Fingerprinting Long Forgiving Messages; Crypto’85, LNCS 218, Springer-Verlag, Berlin 1986, 180–189.
Stefan Brands: An Efficient Off-line Electronic Cash System Based On The Representation Problem; Centrum voor Wiskunde en Informatica, Report CS-R9323, March 1993.
Stefan Brands: Untraceable Offline Cash in Wallet with Observers; Crypto’93, LNCS 773, Springer-Verlag, Berlin 1994, 302–318.
Dan Boneh, James Shaw: Collusion-Secure Fingerprinting for Digital Data; Crypto’95, LNCS 963, Springer-Verlag, Berlin 1995, 452–465.
David Chaum, Hans van Antwerpen: Undeniable Signatures; Crypto’89, LNCS 435, Springer-Verlag, Berlin 1990, 212–216.
Jan Camenisch: Group Signature Schemes and Payment Systems Based on the Discrete Logarithm Problem; Hartung-Gorre Verlag, Konstanz 1998.
David Chaum, Jan-Hendrik Evertse, Jeroen van de Graaf: An improved protocol for demonstrating possession of discrete logarithms and some generalizations; Eurocrypt’87, LNCS 304, Springer-Verlag, Berlin 1988, 127–141.
Benny Chor, Amos Fiat, Moni Naor: Tracing traitors; Crypto’94, LNCS 839, Springer-Verlag, Berlin 1994, 257–270.
Ingemar Cox, Joe Kilian, Tom Leighton, Talal Shamoon: A Secure, Robust Watermark for Multimedia; Information Hiding, LNCS 1174, Springer-Verlag, Berlin 1996, 185–206.
David Chaum, Torben Pryds Pedersen: Wallet Databases with Observers; Crypto’92, LNCS 740, Springer-Verlag, Berlin 1993, 89–105.
Yair Frankel, Yiannis Tsiounis, Moti Yung: “Indirect Discourse Proofs”: Achieving Efficient Fair Off-Line E-cash; Asiacrypt’96, LNCS 1163, Springer-Verlag, Berlin 1997, 287–300.
Yair Frankel, Yiannis Tsiounis, Moti Yung: Fair Off-Line e-Cash Made Easy; Asiacrypt’98, LNCS 1514, Springer-Verlag, Berlin 1998, 257–270.
Birgit Pfitzmann, Matthias Schunter: Asymmetric Fingerprinting; Eurocrypt’96, LNCS 1070, Springer-Verlag, Berlin 1996, 84–95.
David Pointcheval, Jacques Stern: Securitypro ofs for signature schemes; Eurocrypt’96, LNCS 1070, Springer-Verlag, Berlin 1996, 387–398.
David Pointcheval, Jacques Stern: ProvablyS ecure Blind Signature Schemes; Asiacrypt’96, LNCS 1163, Springer-Verlag, Berlin 1996, 252–265.
Birgit Pfitzmann, Ahmad-Reza Sadeghi: Coin-Based Anonymous Fingerprinting; Eurocrypt’99, LNCS 1592, Springer-Verlag, Berlin 1996, 150–164.
Birgit Pfitzmann, Ahmad-Reza Sadeghi: Anonymous Fingerprinting with Direct Non-Repudiation; Cryptology ePrint Archive, Report 2000/032, http://eprint.iacr.org/, 2000.
Birgit Pfitzmann, Michael Waidner: Asymmetric Fingerprinting for Larger Collusions; 4th ACM CCS, ACM Press, New York 1997, 151–160.
Birgit Pfitzmann, Michael Waidner: Anonymous Fingerprinting; Eurocrypt’97, LNCS 1233, Springer-Verlag, Berlin 1997, 88–102.
Claus-Peter Schnorr: Efficient Signature Generation byS mart Cards; Journal of Cryptology 4/3 (1991) 161–174.
Victor Shoup, Rosario Gennaro: Securing threshold cryptosystems against chosen ciphertext attack; Eurocrypt’98, LNCS 1403, Springer-Verlag, Berlin 1998, 1–16.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2000 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Pfitzmann, B.P., Sadeghi, AR. (2000). Anonymous Fingerprinting with Direct Non-repudiation. In: Okamoto, T. (eds) Advances in Cryptology — ASIACRYPT 2000. ASIACRYPT 2000. Lecture Notes in Computer Science, vol 1976. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44448-3_31
Download citation
DOI: https://doi.org/10.1007/3-540-44448-3_31
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-41404-9
Online ISBN: 978-3-540-44448-0
eBook Packages: Springer Book Archive