Publication | Closed Access
Asymmetric fingerprinting based on 1-out-of-n oblivious transfer
21
Citations
5
References
2010
Year
EngineeringBiometric PrivacyInformation SecurityAsymmetric FingerprintingBiometricsInformation ForensicsFingerprint AnalysisHardware SecurityInformation Theoretic Security1-Out-of-n Oblivious TransferSecure CommunicationPrivacy-preserving CommunicationIdentity-based SecurityData PrivacyPrivate Information RetrievalComputer SciencePrivacyData SecurityCryptographyAsymmetric Fingerprinting SchemeAsymmetric Property
In asymmetric fingerprinting, the merchant can trace the traitors from a pirated copy by means of the embedded unique fingerprint, while the customer is immune of being framed due to the asymmetric property. In this letter, we propose an asymmetric fingerprinting scheme based on 1-out-of-n oblivious transfer (OT <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">1</sup> <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">n</sub> ), which is efficient from the bandwidth usage point of view. First, multicast that is an efficient transport technology for one-to-many communication is exploited, which can reduce the bandwidth usage significantly. Second, symmetric encryption instead of public-key encryption is performed on the multimedia content, which also can reduce the complexity and communication cost.
| Year | Citations | |
|---|---|---|
Page 1
Page 1