Weakness and improvements of Yong-Lee's anonymous fingerprinting protocol

Yunho Lee, Seung-Joo Kim, Dongho Won

Research output: Contribution to journalArticle

1 Citation (Scopus)

Abstract

In 2005, Yong and Lee proposed a buyer-seller fingerprinting protocol using symmetric and commutative encryptions. They claimed that their protocol was practical and anonymous since they used symmetric and commutative encryptions. However, an attacker can get the content embedded with one or more honest buyers' fingerprints using man-in-the-middle attack. In this letter, we point out the weakness and propose methods for improving to their protocol.

Original languageEnglish
Pages (from-to)2084-2087
Number of pages4
JournalIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
VolumeE89-A
Issue number7
DOIs
Publication statusPublished - 2006 Jul 1
Externally publishedYes

Fingerprint

Fingerprinting
Cryptography
Encryption
Fingerprint
Attack

Keywords

  • Anonymous buyer-seller protocol
  • Fingerprinting
  • Man-in-the-middle attack
  • Watermarking

ASJC Scopus subject areas

  • Hardware and Architecture
  • Information Systems
  • Electrical and Electronic Engineering

Cite this

Weakness and improvements of Yong-Lee's anonymous fingerprinting protocol. / Lee, Yunho; Kim, Seung-Joo; Won, Dongho.

In: IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E89-A, No. 7, 01.07.2006, p. 2084-2087.

Research output: Contribution to journalArticle

@article{c1d7851d352542ca8a0069aad11575b0,
title = "Weakness and improvements of Yong-Lee's anonymous fingerprinting protocol",
abstract = "In 2005, Yong and Lee proposed a buyer-seller fingerprinting protocol using symmetric and commutative encryptions. They claimed that their protocol was practical and anonymous since they used symmetric and commutative encryptions. However, an attacker can get the content embedded with one or more honest buyers' fingerprints using man-in-the-middle attack. In this letter, we point out the weakness and propose methods for improving to their protocol.",
keywords = "Anonymous buyer-seller protocol, Fingerprinting, Man-in-the-middle attack, Watermarking",
author = "Yunho Lee and Seung-Joo Kim and Dongho Won",
year = "2006",
month = "7",
day = "1",
doi = "10.1093/ietfec/e89-a.7.2084",
language = "English",
volume = "E89-A",
pages = "2084--2087",
journal = "IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences",
issn = "0916-8508",
publisher = "Maruzen Co., Ltd/Maruzen Kabushikikaisha",
number = "7",

}

TY - JOUR

T1 - Weakness and improvements of Yong-Lee's anonymous fingerprinting protocol

AU - Lee, Yunho

AU - Kim, Seung-Joo

AU - Won, Dongho

PY - 2006/7/1

Y1 - 2006/7/1

N2 - In 2005, Yong and Lee proposed a buyer-seller fingerprinting protocol using symmetric and commutative encryptions. They claimed that their protocol was practical and anonymous since they used symmetric and commutative encryptions. However, an attacker can get the content embedded with one or more honest buyers' fingerprints using man-in-the-middle attack. In this letter, we point out the weakness and propose methods for improving to their protocol.

AB - In 2005, Yong and Lee proposed a buyer-seller fingerprinting protocol using symmetric and commutative encryptions. They claimed that their protocol was practical and anonymous since they used symmetric and commutative encryptions. However, an attacker can get the content embedded with one or more honest buyers' fingerprints using man-in-the-middle attack. In this letter, we point out the weakness and propose methods for improving to their protocol.

KW - Anonymous buyer-seller protocol

KW - Fingerprinting

KW - Man-in-the-middle attack

KW - Watermarking

UR - http://www.scopus.com/inward/record.url?scp=33747888700&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=33747888700&partnerID=8YFLogxK

U2 - 10.1093/ietfec/e89-a.7.2084

DO - 10.1093/ietfec/e89-a.7.2084

M3 - Article

AN - SCOPUS:33747888700

VL - E89-A

SP - 2084

EP - 2087

JO - IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

JF - IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

SN - 0916-8508

IS - 7

ER -