2010
DOI: 10.1504/ijics.2010.034815
|View full text |Cite
|
Sign up to set email alerts
|

Bandwidth efficient asymmetric fingerprinting based on one-out-of-two oblivious transfer

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2011
2011
2017
2017

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 15 publications
0
5
0
Order By: Relevance
“…• The systems proposed by Domingo-Ferrer and Megías (2013); Qureshi et al (2015Qureshi et al ( , 2016; Megías and Domingo-Ferrer (2014); Megías (2015); Li et al (2010); Hu and Li (2010); Ye et al (2016) guarantee traceability of copyright violators by using digital fingerprinting techniques. The systems proposed by Sun et al (2009);Win et al (2011) offer copyright protection based on DRM techniques but fail to provide traceability.…”
Section: Previous Work On P2p Content Distribution Systemsmentioning
confidence: 99%
See 1 more Smart Citation
“…• The systems proposed by Domingo-Ferrer and Megías (2013); Qureshi et al (2015Qureshi et al ( , 2016; Megías and Domingo-Ferrer (2014); Megías (2015); Li et al (2010); Hu and Li (2010); Ye et al (2016) guarantee traceability of copyright violators by using digital fingerprinting techniques. The systems proposed by Sun et al (2009);Win et al (2011) offer copyright protection based on DRM techniques but fail to provide traceability.…”
Section: Previous Work On P2p Content Distribution Systemsmentioning
confidence: 99%
“…The proposed framework provides a novel solution of legal content distribution, but it does not include collusion resistance or user privacy. Hu and Li (2010) proposed an asymmetric fingerprinting protocol based on a 1-out-of-2 oblivious transfer protocol from the communication point of view. In the proposed scheme, multicast is exploited to reduce the bandwidth usage.…”
Section: Previous Work On P2p Content Distribution Systemsmentioning
confidence: 99%
“…However, the use of homomorphic encryption expands data and substantially increases the communication bandwidth required for data transfers. Hu and Li (2010) proposed an asymmetric fingerprinting protocol from the communication point of view and is based on a 1-out-of-2 oblivious transfer protocol. Thus, in any case, all the proposed asymmetric fingerprinting schemes involve complex cryptographic protocols which require high bandwidth and heavy computational costs.…”
Section: Asymmetric Fingerprintingmentioning
confidence: 99%
“…Some other homomorphic public key encryption algorithm-based watermarking protocols can be found in Frattolillo (2007), Hu and Zhang (2009), Lei et al (2004), Liu et al (2008) and Zhang et al (2006). In recent years, oblivious transfer has been widely used in designing digital copyright protection protocols (Hu and Li, 2010). An oblivious transfer protocol involves two parties, the sender and the receiver.…”
Section: Related Workmentioning
confidence: 99%