An Anonymous Asymmetric Fingerprinting Scheme with Trusted Third Party

신뢰기관을 이용한 익명적 비대칭 핑거프린팅 기법

  • 용승림 (이화여자대학교 컴퓨터학과) ;
  • 이상호 (이화여자대학교 컴퓨터학과)
  • Published : 2007.08.15

Abstract

The illegal copying and redistribution of digitally-stored information is a crucial problem to distributors who electronically sell digital data. fingerprinting scheme is a technique which supports copyright protection to track redistributors of electronic information using cryptographic techniques. Anonymous asymmetric fingerprinting scheme prevents the merchant from framing a buyer by making the fingerprinted version known to the buyer only. And this scheme allows the buyer to purchase goods without revealing her identity to the seller. In this paper, a new anonymous asymmetric fingerprinting scheme with TTP is introduced. The buyer's fingerprint is generated by the Fingerprint Certificate Authority which is a TTP. When the seller embeds the fingerprint in the digital data, the protocol uses the homomorphic encryption scheme. Thus the seller cannot know the buyer's fingerprint and the buyer's anonymity is guaranteed by using anonymous key pair.

디지털 형식으로 저장되어 있는 데이타의 불법적인 복사와 재분배는 전자상거래 상에서 디지털 콘텐츠를 판매하는 판매자에게 매우 큰 문제가 된다. 핑거프린팅 기법은 암호학적인 기법들을 이용하여 디지털 콘텐츠를 불법적으로 재배포한 구매자를 찾아냄으로써 저작자의 저작권을 보호한다. 익명적 비대칭적 핑거프린팅 기법은 대칭적인 기법과 달리 구매자만이 핑거프린트가 삽입된 콘텐츠를 알 수 있어 구매자가 콘텐츠를 재배포했을 경우만 구매자가 고발되며, 데이타가 재배포되기 전에는 구매자의 익명성이 보장되는 기법이다. 본 논문에서는 신뢰기관을 이용한 익명적 비대칭 핑거프린팅 기법을 제안한다. 이 기법에서는 구매자의 핑거프린트는 신뢰기관인 핑거프린트 인증센터에서 생성한다. 또한, 판매자가 핑거프린트를 삽입할 때, 준동형의 암호를 이용하여 콘텐츠에 삽입함으로써 판매자는 구매자의 핑거프린트를 알 수 없으며 익명 공개키를 이용함으로써 구매자의 익명성을 보장하였다.

Keywords

References

  1. R. Wagner, 'Fingerprinting,' IEEE Symposium on Security and Privacy, Oakland, pp. 18-22, 1983
  2. S. Katzenveisser and F. Petitcolas, Information Hiding, 'Techniques for steganography and digital watermarking,' Artech House, 2000
  3. B. Pfitzmann and M. Waidner, 'Anonymous fingerprinting,' In Advances in Cryptology - EUROCRYPT' 97, LNCS 1233, pp. 88-102, 1997
  4. J. Camenish, 'Efficient anonymous fingerprinting with group signature,' Asisacrypt 2000, LNCS 1976, pp. 415-428, 2000
  5. J. Domingo-Ferrer, 'Anonymous fingerprinting of electronic information with automatic identification redistributors,' IEE Electronic Letters, Vol. 43, No. 13, 1998
  6. M. Kuribayashi and H. Tanaka, 'A new anonymous fingerprinting scheme with high enciphering rate,' INDOCRYPT' 01 , LNCS 22247, pp. 30-39, 2001
  7. G. Blakley, C. Meadow and G. B. Purdy, 'Fingerprinting long forgiving messages,' In Advances in Cryptology - CRYPTO'85, LNCS 218, pp. 180-189, 1986
  8. B. Pfitzmann and M. Schunter, 'Asymmetric fingerprinting,' In Advances in Cryptology - EUROCRYPT' 96, LNCS 1070, pp. 84-95, 1996
  9. H. Ju, H. Kim, D. LEE and J. Lim, 'An anonymous buyer-seller watermarking protocol with anonymity control,' International Conference on Information and Communication Security(ICICS'02), LNCS 2587, pp. 421-432, 2003
  10. J. G. Choi, K. Sakurai and J. H. Park, 'Does it need trusted third party? Design of buyer-seller watermarking in digital contents,' Applied Cryptography and Network Security(ACNS'03), LNCS 2846, pp. 265-279, 2003
  11. D. Chaum, 'An improved protocol for demonstrating possession of discrete logarithms and some generalizations,' In Advances in Cryptology - EUROCRYPT '87, LNCS 304, pp. 127-141, 1987
  12. N. Memon and P. W. Wong, 'A buyer-seller watermarking protocol,' IEEE Transactions on Image Processing, Vol. 10, No.4, pp. 643-649, 2001 https://doi.org/10.1109/83.913598
  13. http://www.kazaa.com
  14. http://www.edonkey2000.com
  15. I. J. Cox, J. Kilian, T. Leighton and T. Shamnon, 'Secure spread spectrum watermarking for image, audio and video,' IEEE Transactions on Image processing, vol.6, no 12, pp. 1673-1678, 1997 https://doi.org/10.1109/83.650120