How to break a semi-anonymous fingerprinting scheme

5Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Fingerprinting schemes are techniques applied to protect the copyright on digital goods. Theyena ble the merchants to identifythe source of illegal redistribution. Anonymous fingerprinting schemes allow the buyers to purchase fingerprinted digital goods anonymously. However, on illegal redistribution the anonymity can be revoked. In this paper we show serious shortcomings of two recent proposals on anonymous fingerprinting schemes. These schemes offer buyers only a weak form of anonymity and allow the merchants to cheat honest buyers. We clarifyt he notations of anonymity and fingerprinting and make several constructive proposals to repair some of the flaws.

Cite

CITATION STYLE

APA

Sadeghi, A. R. (2001). How to break a semi-anonymous fingerprinting scheme. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 2137, pp. 384–394). Springer Verlag. https://doi.org/10.1007/3-540-45496-9_28

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free