Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | 이상호 | * |
dc.contributor.author | 용승림 | * |
dc.date.accessioned | 2016-08-28T11:08:31Z | - |
dc.date.available | 2016-08-28T11:08:31Z | - |
dc.date.issued | 2006 | * |
dc.identifier.isbn | 3540359982 | * |
dc.identifier.isbn | 9783540359982 | * |
dc.identifier.issn | 0302-9743 | * |
dc.identifier.other | OAK-12874 | * |
dc.identifier.uri | https://dspace.ewha.ac.kr/handle/2015.oak/228939 | - |
dc.description.abstract | The illegal copying and redistribution of digital data is a crucial problem to distributors who electronically sell digital data. Fingerprinting scheme is a technique which allows the copyright protection to track redistributors of digital data using cryptographic techniques. Anonymous fingerprinting scheme prevents the merchant from framing a buyer by making the fingerprinted version known to the buyer only. In addition, such a scheme makes it possible for the buyer to purchase goods without revealing his identity to the merchant. In this paper, an efficient anonymous fingerprinting scheme based on secret sharing is introduced. A secret sharing scheme preserves the buyer's anonymity and traceability of traitor. When the buyer purchases a digital data, the buyer's identity is divided into two shares and two shares are embedded into the digital data. When the merchant finds a sold version that has been illegally distributed, he is able to retrieve the fingerprint and find the original buyer's identity by reconstructing it from two shares. When the merchant embeds the fingerprint in the digital data, the protocol uses the homomorphic encryption scheme for practicability. Plus, the digital signature prevents the buyer from denying allegations. © Springer-Verlag Berlin Heidelberg 2006. | * |
dc.description.sponsorship | DigiSensory Technologies, Australia;Infosys, India;MarkAny, Korea;Motorola USA;Smart Internet CRC, Australia | * |
dc.language | English | * |
dc.title | An efficient fingerprinting scheme with secret shairing | * |
dc.type | Conference Paper | * |
dc.relation.volume | 3919 LNCS | * |
dc.relation.index | SCOPUS | * |
dc.relation.startpage | 192 | * |
dc.relation.lastpage | 202 | * |
dc.relation.journaltitle | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | * |
dc.identifier.doi | 10.1007/11787952_15 | * |
dc.identifier.scopusid | 2-s2.0-33746070409 | * |
dc.author.google | Yong S. | * |
dc.author.google | Lee S.-H. | * |
dc.contributor.scopusid | 이상호(56812941400) | * |
dc.date.modifydate | 20240325112122 | * |