Decentralized tracing protocol for fingerprinting system

Research output: Contribution to journalArticle

3 Citations (Scopus)

Abstract

In conventional studies, cryptographic techniques are used to ensure the security of transaction between a seller and buyer in a fingerprinting system. However, the tracing protocol from a pirated copy has not been studied from the security point of view though the collusion resistance is considered by employing a collusion secure fingerprinting code. In this paper, we consider the secrecy of parameters for a fingerprinting code and burdens at a trusted center, and propose a secure tracing protocol jointly executed by a seller and a delegated server. Our main idea is to delegate authority to a server so that the center is required to operate only at the initialization phase in the system. When a pirated copy is found, a seller calculates a correlation score for each user's codeword in an encrypted domain, and identifies illegal users by sending the ciphertexts of scores as queries to the server. The information leakage from the server can be managed at the restriction of response from the server to check the maliciousness of the queries.

Original languageEnglish
Article numbere2
JournalAPSIPA Transactions on Signal and Information Processing
Volume8
DOIs
Publication statusPublished - Jan 1 2019

    Fingerprint

Keywords

  • Collusion attack
  • Fingerprinting
  • Homomorphic encryption
  • Tracing traitor

ASJC Scopus subject areas

  • Signal Processing
  • Information Systems

Cite this