Abstract
In [16] asymmetric fingerprinting of data is presented as a new method of copyright protection. The merchant of the data and each buyer interact in such a way that the buyer gets an individually fingerprinted version of the data, while the merchant does not know the version. If the merchant finds an illegally redistributed version of the data he can trace at least one dishonest buyer even if a collusion of c dishonest buyers created that version. Since the merchant himself never sees the buyers' versions he cannot cast suspicion on some innocent buyers by redistributing appropriate versions.
We present a general construction of an asymmetric fingerprinting scheme based on some arbitrary symmetric fingerprinting scheme. Moreover, we give a construction which is more suitable for broadcast data than the constructions presented in [16].
Preview
Unable to display preview. Download preview PDF.
References
D. Beaver, Secure Multiparty Computation Protocols and Zero-Knowledge Proof Systems Tolerating a Faulty Minority, Journal of Cryptology, 1991, pp. 75–122.
G.R. Blakeley, C. Meadows, G.B. Purdy, Fingerprinting Long Forgiving Messages, Proc. CRYPTO'85, Springer, 1986, pp. 180–189.
Dan Boneh, James Shaw, Collusion-Secure Fingerprinting for Digital Data, Proc. CRYPTO'95, Springer, 1995, pp. 452–465.
Dan Boneh, James Shaw, Collusion-Secure Fingerprinting for Digital Data, Princeton Computer Science Technical Report TR-468-94, 1994.
Gilles Brassard, Claude Crepeau, Jean-Marc Robert, All-or-Nothing Disclosure of Secrets, Proc. CRYPTO'86, Springer, 1987.
Germano Caronni, Assuring Ownership Rights for Digital Images, Proc. Verläßliche Informationssysteme'95, Wiesbaden, 1995, pp. 251–263.
D. Chaum, I. Damgard, J. van de Graaf, Multiparty Computations Ensuring Privacy of each Party's Input and Correctness of the Result, Proc. CRYPTO'87, Springer, 1988, pp. 88–119.
Benny Chor, Amos Fiat, Moni Naor, Tracing Traitors, Proc. CRYPTO'94, Springer, 1994, pp. 257–270.
C. Dwork, J. Lotspiech, M. Naor, Digital Signets: Self-Enforcing Protection of Digital Information, Proc. 28th STOC, 1996.
Uriel Feige, Adi Shamir, Zero-Knowledge Proofs of Knowledge in Two Rounds, Proc. of CRYPTO'89, Springer, 1990.
O. Goldreich, Towards a Theory of Software Protection and Simulation by Oblivious RAMs, Proc. 19th STOC, 1987, pp. 218–229.
O. Goldreich, Foundations of Cryptography, manuscript, available at http://www.wisdom.weizmann.ac.il/people/homepages/oded/frag.html.
S. Goldwasser, S. Micali, C. Rackoff, The Knowledge Complexity of Interactive Proof Systems, SIAM Journal on Computing, Vol. 18, No. 1, 1989, pp. 186–208.
Rafail Ostovsky, An efficient Software Protection Scheme, Proc. CRYPTO'89, Springer, 1990, pp. 610–611.
Birgit Pfitzmann, Trials of Traced Traitors (Extended Abstract), Proc. Workshop on Information Hiding, Cambridge, UK, 1996, Proc. to appear in LNCS, Springer.
Birgit Pfitzmann, Mathias Schunter, Asymmetric Fingerprinting, Proceedings EUROCRYPT'96, Springer, 1996.
Birgit Pfitzmann, Michael Waidner, Asymmetric Fingerprinting for Larger Collusions, Proc. of the 4th ACM Conference on Computer and Communications Security, 1997, to appear; preliminary Version IBM Research Report RZ 2857 (#90805) 08/19/96, IBM Research Division, Zürich.
M. Tompa, H. Woll, Random Self-Reducibility and Zero-Knowledge Interactive Proofs of Possession of Information, Proc. 28th FOCS, 1987, pp. 472–482.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1997 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Biehl, I., Meyer, B. (1997). Protocols for collusion-secure asymmetric fingerprinting. In: Reischuk, R., Morvan, M. (eds) STACS 97. STACS 1997. Lecture Notes in Computer Science, vol 1200. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0023476
Download citation
DOI: https://doi.org/10.1007/BFb0023476
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-62616-9
Online ISBN: 978-3-540-68342-1
eBook Packages: Springer Book Archive