Weakness and Improvements of Yong-Lee's Anonymous Fingerprinting Protocol(Digital Signal Processing)
スポンサーリンク
概要
- 論文の詳細を見る
In 2005, Yong and Lee proposed a buyer-seller fingerprinting protocol using symmetric and commutative encryptions. They claimed that their protocol was practical and anonymous since they used symmetric and commutative encryptions. However, an attacker can get the content embedded with one or more honest buyers' fingerprints using man-in-the-middle attack. In this letter, we point out the weakness and propose methods for improving to their protocol.
- 一般社団法人電子情報通信学会の論文
- 2006-07-01
著者
-
KIM Seungjoo
Information Security Group, Sungkyunkwan University
-
WON Dongho
Information Security Group, Sungkyunkwan University
-
Won Dongho
Information Security Group Sungkyunkwan University
-
Kim Seungjoo
Information Security Group Sungkyunkwan University
-
LEE Yunho
Information Security Group, Sungkyunkwan University
-
Lee Yunho
Information Security Group Sungkyunkwan University
関連論文
- Security Analysis of a Nonce-Based User Authentication Scheme Using Smart Cards(Information Security)
- Weakness in Jung et al.'s ID-Based Conference Key Distribution Scheme(Protocol, Cryptography and Information Security)
- Attack on the Sun-Chen-Hwang's Three-Party Key Agreement Protocols Using Passwords(Protocol, Cryptography and Information Security)
- Weakness and Improvements of Yong-Lee's Anonymous Fingerprinting Protocol(Digital Signal Processing)