Weakness and improvements of Yong-Lee's anonymous fingerprinting protocol

Yunho Lee, Seung-Joo Kim, Dongho Won

Research output: Contribution to journalArticle

1 Citation (Scopus)


In 2005, Yong and Lee proposed a buyer-seller fingerprinting protocol using symmetric and commutative encryptions. They claimed that their protocol was practical and anonymous since they used symmetric and commutative encryptions. However, an attacker can get the content embedded with one or more honest buyers' fingerprints using man-in-the-middle attack. In this letter, we point out the weakness and propose methods for improving to their protocol.

Original languageEnglish
Pages (from-to)2084-2087
Number of pages4
JournalIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Issue number7
Publication statusPublished - 2006 Jul 1
Externally publishedYes


  • Anonymous buyer-seller protocol
  • Fingerprinting
  • Man-in-the-middle attack
  • Watermarking

ASJC Scopus subject areas

  • Hardware and Architecture
  • Information Systems
  • Electrical and Electronic Engineering

Fingerprint Dive into the research topics of 'Weakness and improvements of Yong-Lee's anonymous fingerprinting protocol'. Together they form a unique fingerprint.

  • Cite this