Weakness and improvements of Yong-Lee's anonymous fingerprinting protocol

Yunho Lee, Seungjoo Kim, Dongho Won

Research output: Contribution to journalArticlepeer-review

1 Citation (Scopus)


In 2005, Yong and Lee proposed a buyer-seller fingerprinting protocol using symmetric and commutative encryptions. They claimed that their protocol was practical and anonymous since they used symmetric and commutative encryptions. However, an attacker can get the content embedded with one or more honest buyers' fingerprints using man-in-the-middle attack. In this letter, we point out the weakness and propose methods for improving to their protocol.

Original languageEnglish
Pages (from-to)2084-2087
Number of pages4
JournalIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Issue number7
Publication statusPublished - 2006 Jul
Externally publishedYes


  • Anonymous buyer-seller protocol
  • Fingerprinting
  • Man-in-the-middle attack
  • Watermarking

ASJC Scopus subject areas

  • Signal Processing
  • Computer Graphics and Computer-Aided Design
  • Electrical and Electronic Engineering
  • Applied Mathematics


Dive into the research topics of 'Weakness and improvements of Yong-Lee's anonymous fingerprinting protocol'. Together they form a unique fingerprint.

Cite this