TY - JOUR
T1 - Decentralized tracing protocol for fingerprinting system
AU - Kuribayashi, Minoru
AU - Funabiki, Nobuo
N1 - Publisher Copyright:
© 2019 The Authors.
PY - 2019
Y1 - 2019
N2 - In conventional studies, cryptographic techniques are used to ensure the security of transaction between a seller and buyer in a fingerprinting system. However, the tracing protocol from a pirated copy has not been studied from the security point of view though the collusion resistance is considered by employing a collusion secure fingerprinting code. In this paper, we consider the secrecy of parameters for a fingerprinting code and burdens at a trusted center, and propose a secure tracing protocol jointly executed by a seller and a delegated server. Our main idea is to delegate authority to a server so that the center is required to operate only at the initialization phase in the system. When a pirated copy is found, a seller calculates a correlation score for each user's codeword in an encrypted domain, and identifies illegal users by sending the ciphertexts of scores as queries to the server. The information leakage from the server can be managed at the restriction of response from the server to check the maliciousness of the queries.
AB - In conventional studies, cryptographic techniques are used to ensure the security of transaction between a seller and buyer in a fingerprinting system. However, the tracing protocol from a pirated copy has not been studied from the security point of view though the collusion resistance is considered by employing a collusion secure fingerprinting code. In this paper, we consider the secrecy of parameters for a fingerprinting code and burdens at a trusted center, and propose a secure tracing protocol jointly executed by a seller and a delegated server. Our main idea is to delegate authority to a server so that the center is required to operate only at the initialization phase in the system. When a pirated copy is found, a seller calculates a correlation score for each user's codeword in an encrypted domain, and identifies illegal users by sending the ciphertexts of scores as queries to the server. The information leakage from the server can be managed at the restriction of response from the server to check the maliciousness of the queries.
KW - Collusion attack
KW - Fingerprinting
KW - Homomorphic encryption
KW - Tracing traitor
UR - http://www.scopus.com/inward/record.url?scp=85059744018&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85059744018&partnerID=8YFLogxK
U2 - 10.1017/ATSIP.2018.28
DO - 10.1017/ATSIP.2018.28
M3 - Article
AN - SCOPUS:85059744018
SN - 2048-7703
VL - 8
JO - APSIPA Transactions on Signal and Information Processing
JF - APSIPA Transactions on Signal and Information Processing
M1 - e2
ER -