Abstract | ||
---|---|---|
Traceability schemes have been proposed as a method to establish copyright protection of broadcast information. With asymmetric traceability, the merchant cannot frame an innocent user, while no user can abuse the system without being detected.We propose an asymmetric solution for traceability, based on the very efficient symmetric scheme of Kurosawa-Desmedt [13]. We do not make any trust assumptions about the broadcasting center or other authorities. Furthermore, we establish anonymity protection for all honest users: the identity of a user is protected, until a "fingerprint" of that user is found on a pirate decoder. We make use of well-known cryptographic techniques, such as oblivious transfer, time-lock puzzles and blind signatures. Finally, we propose a cut-and-choose technique to assure the correctness of the decryption keys. |
Year | DOI | Venue |
---|---|---|
2001 | 10.1007/3-540-44700-8_18 | EC-Web |
Keywords | Field | DocType |
blind signature,traceability scheme,copyright protection,asymmetric solution,trust assumptions,asymmetric traceability scheme,broadcasting center,broadcast information,innocent user,anonymity protection,honest user,asymmetric traceability,oblivious transfer | Broadcasting,Cryptography,Computer security,Computer science,Correctness,Fingerprint,Anonymity,Blind signature,Traceability,Oblivious transfer | Conference |
Volume | ISSN | ISBN |
2115 | 0302-9743 | 3-540-42517-9 |
Citations | PageRank | References |
4 | 0.42 | 19 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Emmanouil Magkos | 1 | 217 | 24.01 |
panayiotis kotzanikolaou | 2 | 363 | 28.70 |
vassilios chrissikopoulos | 3 | 160 | 16.11 |