Decentralized tracing protocol for fingerprinting system

Research output: Contribution to journalArticle

Abstract

In conventional studies, cryptographic techniques are used to ensure the security of transaction between a seller and buyer in a fingerprinting system. However, the tracing protocol from a pirated copy has not been studied from the security point of view though the collusion resistance is considered by employing a collusion secure fingerprinting code. In this paper, we consider the secrecy of parameters for a fingerprinting code and burdens at a trusted center, and propose a secure tracing protocol jointly executed by a seller and a delegated server. Our main idea is to delegate authority to a server so that the center is required to operate only at the initialization phase in the system. When a pirated copy is found, a seller calculates a correlation score for each user's codeword in an encrypted domain, and identifies illegal users by sending the ciphertexts of scores as queries to the server. The information leakage from the server can be managed at the restriction of response from the server to check the maliciousness of the queries.

Original languageEnglish
Article numbere2
JournalAPSIPA Transactions on Signal and Information Processing
Volume8
DOIs
Publication statusPublished - Jan 1 2019

Fingerprint

Servers
Network protocols

Keywords

  • Collusion attack
  • Fingerprinting
  • Homomorphic encryption
  • Tracing traitor

ASJC Scopus subject areas

  • Signal Processing
  • Information Systems

Cite this

@article{1e717125e04440fba20b8e85025725d6,
title = "Decentralized tracing protocol for fingerprinting system",
abstract = "In conventional studies, cryptographic techniques are used to ensure the security of transaction between a seller and buyer in a fingerprinting system. However, the tracing protocol from a pirated copy has not been studied from the security point of view though the collusion resistance is considered by employing a collusion secure fingerprinting code. In this paper, we consider the secrecy of parameters for a fingerprinting code and burdens at a trusted center, and propose a secure tracing protocol jointly executed by a seller and a delegated server. Our main idea is to delegate authority to a server so that the center is required to operate only at the initialization phase in the system. When a pirated copy is found, a seller calculates a correlation score for each user's codeword in an encrypted domain, and identifies illegal users by sending the ciphertexts of scores as queries to the server. The information leakage from the server can be managed at the restriction of response from the server to check the maliciousness of the queries.",
keywords = "Collusion attack, Fingerprinting, Homomorphic encryption, Tracing traitor",
author = "Minoru Kuribayashi and Nobuo Funabiki",
year = "2019",
month = "1",
day = "1",
doi = "10.1017/ATSIP.2018.28",
language = "English",
volume = "8",
journal = "APSIPA Transactions on Signal and Information Processing",
issn = "2048-7703",
publisher = "Cambridge University Press",

}

TY - JOUR

T1 - Decentralized tracing protocol for fingerprinting system

AU - Kuribayashi, Minoru

AU - Funabiki, Nobuo

PY - 2019/1/1

Y1 - 2019/1/1

N2 - In conventional studies, cryptographic techniques are used to ensure the security of transaction between a seller and buyer in a fingerprinting system. However, the tracing protocol from a pirated copy has not been studied from the security point of view though the collusion resistance is considered by employing a collusion secure fingerprinting code. In this paper, we consider the secrecy of parameters for a fingerprinting code and burdens at a trusted center, and propose a secure tracing protocol jointly executed by a seller and a delegated server. Our main idea is to delegate authority to a server so that the center is required to operate only at the initialization phase in the system. When a pirated copy is found, a seller calculates a correlation score for each user's codeword in an encrypted domain, and identifies illegal users by sending the ciphertexts of scores as queries to the server. The information leakage from the server can be managed at the restriction of response from the server to check the maliciousness of the queries.

AB - In conventional studies, cryptographic techniques are used to ensure the security of transaction between a seller and buyer in a fingerprinting system. However, the tracing protocol from a pirated copy has not been studied from the security point of view though the collusion resistance is considered by employing a collusion secure fingerprinting code. In this paper, we consider the secrecy of parameters for a fingerprinting code and burdens at a trusted center, and propose a secure tracing protocol jointly executed by a seller and a delegated server. Our main idea is to delegate authority to a server so that the center is required to operate only at the initialization phase in the system. When a pirated copy is found, a seller calculates a correlation score for each user's codeword in an encrypted domain, and identifies illegal users by sending the ciphertexts of scores as queries to the server. The information leakage from the server can be managed at the restriction of response from the server to check the maliciousness of the queries.

KW - Collusion attack

KW - Fingerprinting

KW - Homomorphic encryption

KW - Tracing traitor

UR - http://www.scopus.com/inward/record.url?scp=85059744018&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85059744018&partnerID=8YFLogxK

U2 - 10.1017/ATSIP.2018.28

DO - 10.1017/ATSIP.2018.28

M3 - Article

VL - 8

JO - APSIPA Transactions on Signal and Information Processing

JF - APSIPA Transactions on Signal and Information Processing

SN - 2048-7703

M1 - e2

ER -