Abstract
Fingerprinting schemes deter people from illegally redistributing digital data by enabling the original merchant of the data to identify the original buyer of a redistributed copy. Recently, asymmetric fingerprinting schemes were introduced. Here, only the buyer knows the fingerprinted copy after a sale, and if the merchant finds this copy somewhere, he obtains a proof that it was the copy of this particular buyer.
A problem with all previous fingerprinting schemes arises in the context of electronic marketplaces where untraceable electronic cash offers buyers privacy similar to that when buying books or music in normal shops with normal cash. Now buyers would have to identify themselves solely for the purpose of fingerprinting. To remedy this, we introduce and construct anonymous asymmetric fingerprinting schemes, where buyers can buy information anonymously, but can nevertheless be identified if they redistribute this information illegally.
A subresult of independent interest is an asymmetric fingerprinting protocol with reasonable collusion tolerance and 2-party trials, which have several practical advantages over the previous 3-party trials. Our results can also be applied to so-called traitor tracing, the equivalent of fingerprinting for broadcast encryption.
The work of this author was done at the University of Hildesheim and supported by the DFG (German Research Foundation).
Chapter PDF
Similar content being viewed by others
References
Richard E. Blahut: Theory and Practice of Error Control Codes; Addison-Wesley, Reading 1983.
Stefan Brands: Untraceable Off-line Cash in Wallet with Observers; Crypto’ 93, LNCS 773, Springer-Verlag, Berlin 1994, 302–318.
Gilles Brassard, David Chaum, Claude Crépeau: Minimum Disclosure Proofs of Knowledge; Journal of Computer and System Sciences 37 (1988) 156–189.
Ingrid Biehl, Bernd Meyer: Protocols for Collusion-Secure Asymmetric Fingerprinting; accepted for 14th Symposium on Theoretical Aspects of Computer Science (STACS) 1997.
G. R. Blakley, C. Meadows, G. B. Purdy: Fingerprinting Long Forgiving Messages; Crypto’ 85, LNCS 218, Springer-Verlag, Berlin 1986, 180–189.
Holger Bürk, Andreas Pfitzmann: Value Exchange Systems Enabling Security and Unobservability; Computers & Security 9/8 (1990) 715–721.
F. M. Boland, J. J. K. Ó Ruanaidh, C. Dautzenberg: Watermarking Digital Images for Copyright Protection; 5th IEE International Conference on Image Processing and its Applications, Edinburgh 1995, 326–330.
Dan Boneh, James Shaw: Collusion-Secure Fingerprinting for Digital Data; Crypto’ 95, LNCS 963, Springer-Verlag, Berlin 1995, 452–465.
David Chaum: Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms; Communications of the ACM 24/2 (1981) 84–88.
David Chaum: Security without Identification: Transaction Systems to make Big Brother Obsolete; Communications of the ACM 28/10 (1985) 1030–1044.
Benny Chor, Amos Fiat, Moni Naor: Tracing Traitors; Crypto’ 94, LNCS 839, Springer-Verlag, Berlin 1994, 257–270.
Ingemar Cox, Joe Kilian, Tom Leighton, Talal Shamoon: A Secure, Robust Watermark for Multimedia; Information Hiding, LNCS 1174, Springer-Verlag, Berlin 1996, 185–206.
Yvo Desmedt, Moti Yung: Arbitrated Unconditionally Secure Authentication can be Unconditionally Protected Against Arbiter’s Attacks; Crypto’ 90, LNCS 537, Springer-Verlag, Berlin 1991, 177–188.
Birgit Pfitzmann: Trials of Traced Traitors; Information Hiding, LNCS 1174, Springer-Verlag, Berlin 1996, 49–64.
Birgit Pfitzmann, Matthias Schunter: Asymmetric Fingerprinting; Eurocrypt’ 96, LNCS 1070, Springer-Verlag, Berlin 1996, 84–95.
Birgit Pfitzmann, Michael Waidner: Asymmetric Fingerprinting for Larger Collusions; accepted for 4th ACM Conference on Computer and Communications Security, 1997.
Neal R. Wagner: Fingerprinting; 1983 Symposium on Security and Privacy, IEEE, Oakland, California, 18–22.
Jian Zhao, Eckhard Koch: Embedding Robust Labels Into Images For Copyright Protection; International Congress on Intellectual Property Rights For Specialized Information, Knowledge and New Technologies, Oldenbourg-Verlag, Vienna 1995.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1997 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Pfitzmann, B., Waidner, M. (1997). Anonymous Fingerprinting. In: Fumy, W. (eds) Advances in Cryptology — EUROCRYPT ’97. EUROCRYPT 1997. Lecture Notes in Computer Science, vol 1233. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-69053-0_8
Download citation
DOI: https://doi.org/10.1007/3-540-69053-0_8
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-62975-7
Online ISBN: 978-3-540-69053-5
eBook Packages: Springer Book Archive