Weakness and Improvements of Yong-Lee's Anonymous Fingerprinting Protocol

Yunho LEE  Seungjoo KIM  Dongho WON  

IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences   Vol.E89-A   No.7   pp.2084-2087
Publication Date: 2006/07/01
Online ISSN: 1745-1337
DOI: 10.1093/ietfec/e89-a.7.2084
Print ISSN: 0916-8508
Type of Manuscript: LETTER
Category: Digital Signal Processing
fingerprinting,  anonymous buyer-seller protocol,  watermarking,  man-in-the-middle attack,  

Full Text: PDF(274.1KB)
>>Buy this Article

In 2005, Yong and Lee proposed a buyer-seller fingerprinting protocol using symmetric and commutative encryptions. They claimed that their protocol was practical and anonymous since they used symmetric and commutative encryptions. However, an attacker can get the content embedded with one or more honest buyers' fingerprints using man-in-the-middle attack. In this letter, we point out the weakness and propose methods for improving to their protocol.