By Topic

A Lightweight Buyer-Seller Fingerprinting Protocol

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Yang Shun ; Coll. of Comput. Sci. & Technol., Hunan Int. Econ. Univ., Changsha, China ; Long Xian'ai ; Hu Defa

A buyer-seller fingerprinting protocol can enable a seller to successfully identify a traitor from a pirated copy, while preventing the dishonest seller from framing an innocent buyer. Existing protocols often create a large computation and bandwidth overhead for two reasons: one is a lot of asymmetric ciphers operations are performed and the other is the uniquely fingerprinted copies are sent to each buyer by unicasting which is not a bandwidth efficient way. In this article, we present a lightweight buyer-seller fingerprinting protocol, in which, the asymmetric cipher operations are avoided and the uniquely fingerprinted copies generating process is shifted from the seller side to the buyer side which can avoid a high load at the seller side. Furthermore, the digital content is sent to all buyers by multicasting which can reduce the bandwidth requirement dramatically.

Published in:

Information Technology and Applications (IFITA), 2010 International Forum on  (Volume:3 )

Date of Conference:

16-18 July 2010