In 2005, Yong and Lee proposed a buyer-seller fingerprinting protocol using symmetric and commutative encryptions. They claimed that their protocol was practical and anonymous since they used symmetric and commutative encryptions. However, an attacker can get the content embedded with one or more honest buyers' fingerprints using man-in-the-middle attack. In this letter, we point out the weakness and propose methods for improving to their protocol.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copy
Yunho LEE, Seungjoo KIM, Dongho WON, "Weakness and Improvements of Yong-Lee's Anonymous Fingerprinting Protocol" in IEICE TRANSACTIONS on Fundamentals,
vol. E89-A, no. 7, pp. 2084-2087, July 2006, doi: 10.1093/ietfec/e89-a.7.2084.
Abstract: In 2005, Yong and Lee proposed a buyer-seller fingerprinting protocol using symmetric and commutative encryptions. They claimed that their protocol was practical and anonymous since they used symmetric and commutative encryptions. However, an attacker can get the content embedded with one or more honest buyers' fingerprints using man-in-the-middle attack. In this letter, we point out the weakness and propose methods for improving to their protocol.
URL: https://globals.ieice.org/en_transactions/fundamentals/10.1093/ietfec/e89-a.7.2084/_p
Copy
@ARTICLE{e89-a_7_2084,
author={Yunho LEE, Seungjoo KIM, Dongho WON, },
journal={IEICE TRANSACTIONS on Fundamentals},
title={Weakness and Improvements of Yong-Lee's Anonymous Fingerprinting Protocol},
year={2006},
volume={E89-A},
number={7},
pages={2084-2087},
abstract={In 2005, Yong and Lee proposed a buyer-seller fingerprinting protocol using symmetric and commutative encryptions. They claimed that their protocol was practical and anonymous since they used symmetric and commutative encryptions. However, an attacker can get the content embedded with one or more honest buyers' fingerprints using man-in-the-middle attack. In this letter, we point out the weakness and propose methods for improving to their protocol.},
keywords={},
doi={10.1093/ietfec/e89-a.7.2084},
ISSN={1745-1337},
month={July},}
Copy
TY - JOUR
TI - Weakness and Improvements of Yong-Lee's Anonymous Fingerprinting Protocol
T2 - IEICE TRANSACTIONS on Fundamentals
SP - 2084
EP - 2087
AU - Yunho LEE
AU - Seungjoo KIM
AU - Dongho WON
PY - 2006
DO - 10.1093/ietfec/e89-a.7.2084
JO - IEICE TRANSACTIONS on Fundamentals
SN - 1745-1337
VL - E89-A
IS - 7
JA - IEICE TRANSACTIONS on Fundamentals
Y1 - July 2006
AB - In 2005, Yong and Lee proposed a buyer-seller fingerprinting protocol using symmetric and commutative encryptions. They claimed that their protocol was practical and anonymous since they used symmetric and commutative encryptions. However, an attacker can get the content embedded with one or more honest buyers' fingerprints using man-in-the-middle attack. In this letter, we point out the weakness and propose methods for improving to their protocol.
ER -