Abstract
In 2005, Yong and Lee proposed a buyer-seller fingerprinting protocol using symmetric and commutative encryptions. They claimed that their protocol was practical and anonymous since they used symmetric and commutative encryptions. However, an attacker can get the content embedded with one or more honest buyers' fingerprints using man-in-the-middle attack. In this letter, we point out the weakness and propose methods for improving to their protocol.
Original language | English |
---|---|
Pages (from-to) | 2084-2087 |
Number of pages | 4 |
Journal | IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences |
Volume | E89-A |
Issue number | 7 |
DOIs | |
Publication status | Published - 2006 Jul |
Externally published | Yes |
Keywords
- Anonymous buyer-seller protocol
- Fingerprinting
- Man-in-the-middle attack
- Watermarking
ASJC Scopus subject areas
- Signal Processing
- Computer Graphics and Computer-Aided Design
- Electrical and Electronic Engineering
- Applied Mathematics