메뉴 건너뛰기




Volumn 4456 LNAI, Issue , 2007, Pages 824-832

An efficient anonymous fingerprinting protocol

Author keywords

[No Author keywords available]

Indexed keywords

DISTRIBUTED COMPUTER SYSTEMS; INFORMATION MANAGEMENT; LEGACY SYSTEMS; NETWORK PROTOCOLS; TABU SEARCH; USER INTERFACES;

EID: 38349063591     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: None     Document Type: Conference Paper
Times cited : (12)

References (15)
  • 1
    • 84957670625 scopus 로고
    • Collusion-secure Fingerprinting for Digital Data
    • Coppersmith, D, ed, Advances in Cryptology, CRYPTO '95, Springer, Heidelberg
    • Boneh, D., Shaw, J.: Collusion-secure Fingerprinting for Digital Data. In: Coppersmith, D. (ed.) Advances in Cryptology - CRYPTO '95. LNCS, vol. 963, pp. 452-465. Springer, Heidelberg (1995)
    • (1995) LNCS , vol.963 , pp. 452-465
    • Boneh, D.1    Shaw, J.2
  • 2
    • 84947942283 scopus 로고
    • Fingerprinting Long Forgiving Message
    • Williams, H.C, ed, Advances in Cryptology, Springer, Heidelberg
    • Blakley, G.R., Blakley, G.R., Meadows, C., Purdy, G.B.: Fingerprinting Long Forgiving Message. In: Williams, H.C. (ed.) Advances in Cryptology. LNCS, vol. 218, pp. 180-189. Springer, Heidelberg (1986)
    • (1986) LNCS , vol.218 , pp. 180-189
    • Blakley, G.R.1    Blakley, G.R.2    Meadows, C.3    Purdy, G.B.4
  • 3
    • 84947921515 scopus 로고
    • Asymmetric Fingerprinting
    • Nagl, M, ed, GraphTheoretic Concepts in Computer Science, Springer, Heidelberg
    • Pfitzmann, B., Schunter, M.: Asymmetric Fingerprinting. In: Nagl, M. (ed.) GraphTheoretic Concepts in Computer Science. LNCS, vol. 1017, pp. 84-95. Springer, Heidelberg (1995)
    • (1995) LNCS , vol.1017 , pp. 84-95
    • Pfitzmann, B.1    Schunter, M.2
  • 4
    • 84957353052 scopus 로고    scopus 로고
    • Anonymous Fingerprinting
    • Fumy, W, ed, Advances in Cryptology, EUROCRYPT '97, Springer, Heidelberg
    • Pfitzmann, B., Waidner, M.: Anonymous Fingerprinting. In: Fumy, W. (ed.) Advances in Cryptology - EUROCRYPT '97. LNCS, vol. 1233, pp. 88-102. Springer, Heidelberg (1997)
    • (1997) LNCS , vol.1233 , pp. 88-102
    • Pfitzmann, B.1    Waidner, M.2
  • 5
    • 0032091525 scopus 로고    scopus 로고
    • Anonymous Fingerprinting of Electronic Information with Automatic Identification of Redistributor
    • Domingo-Ferrer, J.: Anonymous Fingerprinting of Electronic Information with Automatic Identification of Redistributor. IEE Electronics Letters 13, 1303-1304 (1998)
    • (1998) IEE Electronics Letters , vol.13 , pp. 1303-1304
    • Domingo-Ferrer, J.1
  • 6
    • 84959042187 scopus 로고    scopus 로고
    • Efficient Anonymous Fingerprinting of Electronic Information with Improved Automatic Identification of Redistributor
    • Won, D, ed, Information Security and Cryptology, ICISC 2000, Springer, Heidelberg
    • Chung, C., Choi, S., Choi, Y., Won, D.: Efficient Anonymous Fingerprinting of Electronic Information with Improved Automatic Identification of Redistributor. In: Won, D. (ed.) Information Security and Cryptology - ICISC 2000. LNCS, vol. 2015, pp. 221-234. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2015 , pp. 221-234
    • Chung, C.1    Choi, S.2    Choi, Y.3    Won, D.4
  • 7
    • 84937417240 scopus 로고    scopus 로고
    • Efficient Anonymous Fingerpriting with Group Signature
    • Okamoto, T, ed, Advances in Cryptology, ASIACRYPT 2000, Springer, Heidelberg
    • Camenish, J.: Efficient Anonymous Fingerpriting with Group Signature. In: Okamoto, T. (ed.) Advances in Cryptology - ASIACRYPT 2000. LNCS, vol. 1976, pp. 415-428. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1976 , pp. 415-428
    • Camenish, J.1
  • 8
    • 0142156716 scopus 로고    scopus 로고
    • A Simple Anonymous Fingerprinting Scheme based on Blind Signature
    • Qing, S, Gollmann, D, Zhou, J, eds, Information and Communications Security, Springer, Heidelberg
    • Wang, Y., Lu, S., Liu, Z.: A Simple Anonymous Fingerprinting Scheme based on Blind Signature. In: Qing, S., Gollmann, D., Zhou, J. (eds.) Information and Communications Security. LNCS, vol. 2836, pp. 260-268. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2836 , pp. 260-268
    • Wang, Y.1    Lu, S.2    Liu, Z.3
  • 9
    • 84944061568 scopus 로고    scopus 로고
    • Anonymous Fingerprinting as Secure as the Bilinear Diffie-Hellman Assumption
    • Deng, R.H, Qing, S, Bao, F, Zhou, J, eds, Information and Communications Security ICICS 2002, Springer, Heidelberg
    • Kim, M., Kim, J., Kim, K.: Anonymous Fingerprinting as Secure as the Bilinear Diffie-Hellman Assumption. In: Deng, R.H., Qing, S., Bao, F., Zhou, J. (eds.) Information and Communications Security ICICS 2002. LNCS, vol. 2513, Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2513
    • Kim, M.1    Kim, J.2    Kim, K.3
  • 10
    • 84947297384 scopus 로고    scopus 로고
    • A Collusion-Secure Fingerprinting Code Reduced by Chinese Remaindering and Its Random-Error Resilience
    • Moskowitz, I.S, ed, Information Hiding, IH 2001, Springer, Heidelberg
    • Hirofumi Muratani, A., Muratani, H.: A Collusion-Secure Fingerprinting Code Reduced by Chinese Remaindering and Its Random-Error Resilience. In: Moskowitz, I.S. (ed.) Information Hiding - IH 2001. LNCS, vol. 2137, pp. 301-305. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2137 , pp. 301-305
    • Hirofumi Muratani, A.1    Muratani, H.2
  • 11
    • 33646836150 scopus 로고    scopus 로고
    • Binary Codes for Collusion-Secure Fingerprinting
    • Kim, K.-c, ed, Information Security and Cryptology, ICISC 2001, Springer, Heidelberg
    • Cohen, G., Litsyn, S., Zemor, G.: Binary Codes for Collusion-Secure Fingerprinting. In: Kim, K.-c. (ed.) Information Security and Cryptology - ICISC 2001. LNCS, vol. 2288, pp. 178-185. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2288 , pp. 178-185
    • Cohen, G.1    Litsyn, S.2    Zemor, G.3
  • 12
    • 0037399342 scopus 로고    scopus 로고
    • Digital Fingerprinting Codes: Problem Statements, Construction. Identification of Traiors
    • Barg, A., Blakley, G.R., Kabatiansky, G.A.: Digital Fingerprinting Codes: Problem Statements, Construction. Identification of Traiors. IEEE Transaction on Information Theory 49(4), 852-865 (2003)
    • (2003) IEEE Transaction on Information Theory , vol.49 , Issue.4 , pp. 852-865
    • Barg, A.1    Blakley, G.R.2    Kabatiansky, G.A.3
  • 13
    • 84864708144 scopus 로고
    • Multiparty computations ensuring privacy of each party's input and correctness of the result
    • Pomerance, C, ed, Advances in Cryptology, CRYPTO '87, Springer, Heidelberg
    • Chaum, D., Damgaard, I.B., van de Graaf, J.: Multiparty computations ensuring privacy of each party's input and correctness of the result, In: Pomerance, C. (ed.) Advances in Cryptology - CRYPTO '87. LNCS, vol. 293, pp. 87-119. Springer, Heidelberg (1988)
    • (1988) LNCS , vol.293 , pp. 87-119
    • Chaum, D.1    Damgaard, I.B.2    van de Graaf, J.3
  • 15
    • 0003738614 scopus 로고
    • Off-Line Cash Transfer by Smart Cards
    • Technical Report CSR9455,CWI(Centre for Mathematics and Computer Science, Amsterdam () Available at
    • Brands, S.: Off-Line Cash Transfer by Smart Cards. Technical Report CSR9455,CWI(Centre for Mathematics and Computer Science), Amsterdam (1994) Available at http://www.cwi.nl/static/publications/reports/CS-R9455
    • (1994)
    • Brands, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.