Ring-based anonymous fingerprinting scheme

被引:0
作者
Lei, Q [1 ]
Jiang, ZT [1 ]
Wang, YM [1 ]
机构
[1] Xidian Univ, Key Lab Comp Networks Informat Secur Minist Educ, Xian 710071, Peoples R China
来源
COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS | 2005年 / 3802卷
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Fingerprinting schemes are important techniques for protection of intellectual property. However, the previous schemes have some trust assumption made on the registration center, meanwhile they always consider the collusion between the registration and the merchant, also the buyer. To overcome those disadvantages, an anonymous fingerprinting scheme using a modification of Schnorr ring signature is presented. When a buyer wants to buy digital goods, he can sign the text m that describes the deal on behalf of the ring, which can bring fully anonymity and unlinkability. Once redistributing fingerprinted copies, a merchant still could trace the buyer with a slightly different version.
引用
收藏
页码:1080 / 1085
页数:6
相关论文
共 10 条
[1]   MINIMUM DISCLOSURE PROOFS OF KNOWLEDGE [J].
BRASSARD, G ;
CHAUM, D ;
CREPEAU, C .
JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 1988, 37 (02) :156-189
[2]  
Camenisch J, 2000, LECT NOTES COMPUT SC, V1976, P415
[3]  
Choi JG, 2003, 37TH ANNUAL 2003 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, P587
[4]  
Herranz J, 2003, LECT NOTES COMPUT SC, V2904, P266
[5]  
Ju HS, 2002, LECT NOTES COMPUT SC, V2587, P421
[6]  
NARO M, 1990, LECT NOTES COMPUTER, V435, P128
[7]  
Pfitzmann B., 1997, Advances in Cryptology - EUROCRYPT '97. International Conference on the Theory and Application of Cryptographic Techniques Proceedings, P88
[8]  
PFIZMANN B, 2000, LECT NOTES COMPUTER, V1976, P401
[9]  
Rivest R. L., 2001, LNCS, P552, DOI DOI 10.1007/3-540-45682-1_32
[10]  
Wang Y, 2003, LECT NOTES COMPUT SC, V2836, P260