Your browser does not support JavaScript!

Anonymous fingerprinting of electronic information with automatic identification of redistributors

Anonymous fingerprinting of electronic information with automatic identification of redistributors

For access to this article, please select a purchase option:

Buy article PDF
(plus tax if applicable)
Buy Knowledge Pack
10 articles for $120.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Your details
Why are you recommending this title?
Select reason:
Electronics Letters — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

Fingerprinting is a technique for protecting intellectual ownership of electronic information. Anonymous fingerprinting schemes were recently proposed to allow a seller to fingerprint information sold to a buyer without knowing the identity of the buyer and without the seller seeing the fingerprinted copy. Finding a (redistributed) fingerprinted copy enables the seller to find out and prove to third parties whose copy it was. The authors present the first anonymous fingerprinting scheme in which the help of a registration authority is not required in order to identify a redistributor.


    1. 1)
      • Chaum, D., Damgaard, I.B., van de Graaf, J.: `Multiparty computations ensuringprivacy of each party's input and correctness of the result', LNCS 293, Advances in Cryptology-CRYPTO'87, 1988, Springer-Verlag, Berlin, p. 87–119.
    2. 2)
      • Pfitzmann, B., Waidner, M.: `Anonymous fingerprinting', LNCS 1233, Advances in Cryptology-EUROCRYPT'97, 1997, Springer-Verlag, Berlin, p. 88–102.
    3. 3)
      • Boneh, D., Shaw, J.: `Collusion-secure fingerprinting for digital data', LNCS 963, Advances in Cryptology- CRYPTO'95, 1995, Springer-Verlag, Berlin, p. 452–465.
    4. 4)
      • Blakley, G.R., Meadows, C., Purdy, G.B.: `Fingerprinting long forgiving messages', LNCS 218, Advances in Cryptology- CRYPTO '85, 1986, Springer-Verlag, Berlin, p. 180–189.
    5. 5)
      • T. ElGamal . A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory , 469 - 472
    6. 6)
      • Chaum, D., Evertse, J.-H., van de Graaf, J.: `An improved protocol for demostratingpossession of discrete logarithms and some generalizations', LNCS 304, Advances in Cryptology-EUROCRYPT'87, 1988, Springer-Verlag, Berlin, p. 127–141.
    7. 7)
      • Pfitzmann, B., Schunter, M.: `Asymmetric fingerprinting', LNCS 1070, Advances in Cryptology-EUROCRYPT'96, 1996, Springer-Verlag, Berlin, p. 84–95.

Related content

This is a required field
Please enter a valid email address