期刊文献+

一种新的二次分发数字指纹协议

Digital Fingerprinting Protocol for Secondary Distribution
下载PDF
导出
摘要 现有的数字指纹协议主要基于Buyer-Seller模型,卖方拥有数字产品的原始拷贝,在数字产品中嵌入与买方相关的数字指纹,出售给买方。如果卖方发现了非法拷贝,根据提取出的指纹跟踪非法的买方。该文介绍了有别于Buyer-Seller模型的二次分发模型,在此模型基础上,引入防篡改硬件和对称嵌入技术,提出了一种可用于在线交易的、安全高效的数字指纹协议。 The available fingerprinting protocols are mainly based on the Buyer-Seller model. In the Buyer-Seller model, the seller is the holder of the original copy of the digital product. He embeds the fingerprinting relative to the buyer to make a new copy and sell the new copy to the buyer. When an illegal copy is found, the seller can extract the fingerprinting to trace the illegal buyer. This paper introduces a different model, the secondary distribution mode. Based on the new model, it employs tamper-proof hardware and symmetric encryption technology to design a secure and efficient digital fingerprinting protocol which can be used for on-line trade.
出处 《计算机工程》 CAS CSCD 北大核心 2007年第17期156-158,共3页 Computer Engineering
基金 国家自然科学基金(60303026)
关键词 二次分发 防篡改硬件 数字指纹 secondary distribution tamper-proof hardware digital fingerprinting
  • 相关文献

参考文献8

  • 1Cheung S C,Curreem H,Chiu D K W.A Watermarking Infrastructure for Digital Rights Protection[C]//Proc.of the 4th International Conference on Electronic Commerce,Hong Kong.2002:13. 被引量:1
  • 2Iwamura K,Sakurai K,Imai H.A Secure Digital Watermark System for Secondary Distribution[J].Electronics and Communications in Japan(Part 3),2003,86(6):76-89. 被引量:1
  • 3Feng Bao.Multimedia Content Protection by Cryptography and Watermarking in Tamper-resistant Hardware[C]//Proc.of the ACM Workshops on Multimedia.2002:139-142. 被引量:1
  • 4王彦,吕述望,刘振华.一种基于秘密分享的非对称数字指纹体制[J].中国科学技术大学学报,2003,33(2):237-242. 被引量:3
  • 5Kuribayashi M,Tanaka H.Fingerprinting Protocol for On-line Trade Using Information Gap Between Buyer and Merchant[J].IEICE Transctions on Fundamentals of Electronics,2006,E89-A(4):1108-1115. 被引量:1
  • 6Phatak,Rao S S.Logistic Map:A Possible Random-number Generator[J].Physical Review E,1995,51(4):3670-3678. 被引量:1
  • 7李勇,杨波,华翔.一种高效匿名的数字指纹方案[J].西安电子科技大学学报,2003,30(3):394-398. 被引量:7
  • 8Boneh D,Shaw J.Collusion-secure Fingerprinting for Digital Data[C]// Proc.of CRYPTO'95.1995:452-565. 被引量:1

二级参考文献21

  • 1Pfitzmann B, M. Schunter. Asymmetric fingerprinting[A]. Ueli M Maurer ed. Advances in Cryptology-EUROCRYPT' 96 [ C ]. Berlin:Springer, 1996.84-95. 被引量:1
  • 2Pfitzmann B, Waidner M. Asymmetric fingerprinting for larger collusions [ A ]. Proc. of the 4th ACM Conf. on Computer and Communications Security[C]. Zürich:ACM Press, 1997.151-160. 被引量:1
  • 3Pfitzmann B, Waidner M. Anonymous fingerprinting [ A ]. Walter Fumy ed. Advances in Cryptology-EUROCRYPT "97 [ C ]. Berlin :Springer, 1997. 88-102. 被引量:1
  • 4Camenisch J. Efficient Anonymous fingerprinting with group signatures [ A ]. Tatsuaki Okamoto ed. Advances in Cryptology - Asiacrypt 2000[C]. Berlin:Springer, 2000. 415-428. 被引量:1
  • 5Memon N, Wong P W. A buyer-seller watermarking Protocol [ J ]. IEEE Trans. on Image Processing, April, 2001,10(4) :643-649. 被引量:1
  • 6Domingo-Ferrer J. Anonymous fingerprinting based on committed oblivious transfer [ A ]. H Imai and Y Zheng. eds. Public Key Cryptography'99[C]. Berlin: Springer, 1999. 43-52. 被引量:1
  • 7Wang Y, Lü S W, Liu Z H. A new asymmetric fingerprinting framework based on secret sharing[ A]. Borka Jerman-Blazic, Tomaz Klobucar eds. Communications and Multimedia Security[C]. Dordrecht: Kluwer,2002. 29-40. 被引量:1
  • 8Alon, N, Spencer, J. The probabilistic method, 1st edtion [ M]. New York: J Wiley &Sons, Inc., 1992. 234-240. 被引量:1
  • 9Blakley G R, Meadows C, Prudy G B. Fingerprinting long forgiving messages [ A ]. Williams Hugh C ed. Advances in Cryptology-CRYPTO "85[C]. Berlin: Springer, 1985. 180-189. 被引量:1
  • 10Boneh D, Shaw J. Collusion-secure fingerprinting for digital data [ J ]. IEEE Trans. on Inform. Theory, Sep. 1998, IT-44,: 1 897-1 905. 被引量:1

共引文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部