首页> 外文期刊>IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences >How to Break COT-Based Fingerprinting Schemes and Design New One
【24h】

How to Break COT-Based Fingerprinting Schemes and Design New One

机译:如何打破基于COT的指纹方案并设计新的指纹方案

获取原文
获取原文并翻译 | 示例

摘要

Digital fingerprinting schemes are cryptographic methods deterring buyers from illegally redistributing digital contents. It enables sellers to identify the traitor by providing each buyer with a slight different version. What is important in designing fingerprinting scheme is to make it more practical and efficient. Recently, two oblivious transfer protocol-based schemes to consider practicality were proposed. These are significant in the sense that they are completely specified from a computation point of view and are thus readily implementable. But these schemes cannot offer the security of sellers and buyers. In this paper, we show how to break the existing oblivious transfer-based fingerprinting schemes and then suggest how to make secure fingerprinting schemes against the dishonesty of sellers and buyers. We use oblivious transfer protocol with two-lock cryptosystem to make it practical and secure. All computations are performed efficiently and the security degree is strengthened in our proposal.
机译:数字指纹方案是阻止购买者非法重新分发数字内容的加密方法。通过为每个买家提供略有不同的版本,它使卖家能够识别出叛徒。在设计指纹方案时,重要的是使其更加实用和高效。最近,提出了两种考虑实用性的基于遗忘传输协议的方案。从计算的角度来看,它们是完全指定的,因此很容易实现,因此它们意义重大。但是这些方案不能为买卖双方提供安全保障。在本文中,我们将展示如何打破现有的基于转移的遗忘指纹方案,然后提出如何制定安全的指纹方案以防止买卖双方的不诚实行为。我们使用带有两锁密码系统的遗忘传输协议来使其实用且安全。我们的建议有效地执行了所有计算,并增强了安全性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号