Á¤º¸°úÇÐȸ ³í¹®Áö A : ½Ã½ºÅÛ ¹× ÀÌ·Ð
ÇѱÛÁ¦¸ñ(Korean Title) |
ºñ¹ÐºÐ»ê¹ýÀ» ÀÌ¿ëÇÑ ÀÍ¸í¼º º¸Àå ÇΰÅÇÁ¸°Æà ±â¹ý |
¿µ¹®Á¦¸ñ(English Title) |
Anonymous Fingerprinting Method using the Secret Sharing Scheme |
ÀúÀÚ(Author) |
¿ë½Â¸²
ÀÌ»óÈ£
|
¿ø¹®¼ö·Ïó(Citation) |
VOL 31 NO. 06 PP. 0353 ~ 0359 (2004. 06) |
Çѱ۳»¿ë (Korean Abstract) |
µðÁöÅÐ Çü½ÄÀ¸·Î ÀúÀåµÇ¾î ÀÖ´Â µ¥ÀÌŸÀÇ ºÒ¹ýÀûÀÎ º¹»ç¿Í ÀçºÐ¹è´Â ÀüÀÚ»ó°Å·¡ »ó¿¡¼ µ¥ÀÌŸ¸¦ ÆǸÅÇÏ´Â »óÁ¡¿¡°Ô ¸Å¿ì Å« ¹®Á¦°¡ µÈ´Ù. ÇΰÅÇÁ¸°Æà ±â¹ýÀº ¾ÏÈ£ÇÐÀûÀÎ ±â¹ýµéÀ» ÀÌ¿ëÇÏ¿© µðÁöÅÐ µ¥ÀÌŸ¸¦ ºÒ¹ýÀûÀ¸·Î Àç¹èÆ÷ÇÑ »ç¿ëÀÚ¸¦ ã¾Æ³¿À¸·Î½á µðÁöÅÐ µ¥ÀÌŸÀÇ ÀúÀÛ±ÇÀ» º¸È£ÇÑ´Ù. ÀÍ¸í¼ºÀÌ º¸ÀåµÇ´Â ÇΰÅÇÁ¸°Æà ±â¹ýÀº ´ëĪÀûÀÎ ±â¹ý°ú ´Þ¸® »ç¿ëÀÚ¸¸ÀÌ ÇΰÅÇÁ¸°Æ®°¡ »ðÀÔµÈ µ¥ÀÌŸ¸¦ ¾Ë ¼ö ÀÖ°í ºñ´ëĪ ±â¹ý°ú ´Þ¸® µ¥ÀÌŸ°¡ Àç¹èÆ÷µÇ±â Àü¿¡´Â »ç¿ëÀÚÀÇ ÀÍ¸í¼ºÀÌ º¸ÀåµÇ´Â ±â¹ýÀÌ´Ù. º» ³í¹®¿¡¼´Â ºñ¹ÐºÐ»ê¹ýÀ» ÀÌ¿ëÇÑ ÀÍ¸í¼ºÀÌ º¸ÀåµÇ´Â »õ·Î¿î ÇΰÅÇÁ¸°Æà ±â¹ýÀ» Á¦¾ÈÇÑ´Ù. »óÁ¡Àº ÀÌÀü¿¡ ¹èÆ÷µÇ¾ú´ø µ¥ÀÌŸ¸¦ ã¾ÒÀ» °æ¿ì, µ¥ÀÌŸ·ÎºÎÅÍ Àç¹èÆ÷ÀÚÀÇ ½Å¿øÁ¤º¸¸¦ ÃßÃâÇÏ¿© Àç¹èÆ÷ÀÚÀÇ ¹èÆ÷»ç½ÇÀ» Áõ¸íÇÒ ¼ö ÀÖ´Ù. ¶ÇÇÑ µî·Ï½Ã¿¡ Schnorr ¼¸íÀ» ÀÌ¿ëÇÏ¿© °í¹ßµÈ »ç¿ëÀÚ°¡ ¹üÇàÀ» ºÎÀÎÇÒ ¼ö ¾øµµ·Ï ÇÑ´Ù. Á¦¾ÈµÈ ¹æ¹ýÀº ÀÌ»ê´ë¼ö¹®Á¦¿Í ¾çÀÚ°£ ¾ÈÀüÇÑ °è»ê°úÁ¤ÀÇ ¾ÈÀü¼º¿¡ ±Ù°ÅÇÏ¿© »ç¿ëÀÚÀÇ ÀÍ¸í¼ºÀÌ º¸ÀåµÈ´Ù. |
¿µ¹®³»¿ë (English Abstract) |
The illegal copying and redistribution of digitally-stored information is a crucial problem to distributors who electronically sell digital data. Fingerprinting scheme is a techniques which supports copyright protection to track redistributors of electronic information using cryptographic techniques. Anonymous fingerprinting schemes, differ from symmetric fingerprinting, prevent the merchant from framing a buyer by making the fingerprinted version known to the buyer only. And the scheme, differ from asymmetric fingerprinting, allows the buyer to purchase goods without revealing her identity to the merchant. In this paper, a new anonymous fingerprinting scheme based on secret sharing is introduced. The merchant finds a sold version that has been distributed, and then he is able to retrieve a buyer's identity and take her to court. And Schnorr's digital signature prevents the buyer from denying the fact he redistributed. The buyer's anonymity relies on the security of discrete logarithm and secure two-party computations., |
Å°¿öµå(Keyword) |
Á¤º¸º¸¾È
À͸íÀû ÇΰÅÇÁ¸°Æà ±â¹ý
ºñ¹ÐºÐ»ê¹ý
ÀúÀÛ±Ç º¸È£
ÀüÀÚ¼¸í
Anonymous fingerprinting
Secret sharing
|
ÆÄÀÏ÷ºÎ |
PDF ´Ù¿î·Îµå
|