Weakness and Improvements of Yong-Lee's Anonymous Fingerprinting Protocol

Yunho LEE, Seungjoo KIM, Dongho WON

  • Full Text Views

    0

  • Cite this

Summary :

In 2005, Yong and Lee proposed a buyer-seller fingerprinting protocol using symmetric and commutative encryptions. They claimed that their protocol was practical and anonymous since they used symmetric and commutative encryptions. However, an attacker can get the content embedded with one or more honest buyers' fingerprints using man-in-the-middle attack. In this letter, we point out the weakness and propose methods for improving to their protocol.

Publication
IEICE TRANSACTIONS on Fundamentals Vol.E89-A No.7 pp.2084-2087
Publication Date
2006/07/01
Publicized
Online ISSN
1745-1337
DOI
10.1093/ietfec/e89-a.7.2084
Type of Manuscript
LETTER
Category
Digital Signal Processing

Authors

Keyword

FlyerIEICE has prepared a flyer regarding multilingual services. Please use the one in your native language.