Solutions to the anti-piracy problem in oblivious transfer

In this paper, we consider the applications of digital fingerprinting in oblivious transfer (OT) and present the solutions to the anti-piracy problem in OT protocols. OT protocols can be applied to goods purchasing, pay-per-view TV and sensitive database access while maintaining the users' privacy. In these applications, if the users redistribute the messages that they acquired from the server's database or sell them to others, then both of the server's privacy and benefits will be damaged. Prior to this work, such an anti-piracy problem has never been considered in the OT protocols, even though it is an essential problem to make OT protocols adoptable in practice. In this work, we consider this problem for the first time and present practical solutions, by combining a digital fingerprinting scheme into OT, to provide the pirate-tracing in OT protocols. By performance analysis, our solutions turn out to be practical.

[1]  Michael O. Rabin,et al.  How To Exchange Secrets with Oblivious Transfer , 2005, IACR Cryptol. ePrint Arch..

[2]  Matthew Green,et al.  Blind Identity-Based Encryption and Simulatable Oblivious Transfer , 2007, ASIACRYPT.

[3]  Catherine A. Meadows,et al.  Fingerprinting Long Forgiving Messages , 1985, CRYPTO.

[4]  Masakatu Morii,et al.  Fingerprinting Protocol Based on Distributed Providers Using Oblivious Transfer , 2006, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[5]  Wen-Guey Tzeng,et al.  Efficient k-out-of-n Oblivious Transfer Schemes , 2005, J. Univers. Comput. Sci..

[6]  Jan Camenisch,et al.  Oblivious transfer with access control , 2009, IACR Cryptol. ePrint Arch..

[7]  Moni Naor,et al.  Oblivious transfer and polynomial evaluation , 1999, STOC '99.

[8]  Ingemar J. Cox,et al.  An Asymmetric Fingerprinting Scheme Based on Tardos Codes , 2011, Information Hiding.

[9]  Matthew Green,et al.  Controlling Access to an Oblivious Database Using Stateful Anonymous Credentials , 2009, Public Key Cryptography.

[10]  Josep Domingo-Ferrer,et al.  Anonymous Fingerprinting Based on Committed Oblivious Transfer , 1999, Public Key Cryptography.

[11]  Qiaoliang Li,et al.  Asymmetric fingerprinting based on 1-out-of-n oblivious transfer , 2010, IEEE Communications Letters.

[12]  Matthew Green,et al.  Universally Composable Adaptive Oblivious Transfer , 2008, IACR Cryptol. ePrint Arch..

[13]  Yehuda Lindell,et al.  Efficient Fully-Simulatable Oblivious Transfer , 2008, Chic. J. Theor. Comput. Sci..

[14]  Dan Boneh,et al.  Collusion-Secure Fingerprinting for Digital Data (Extended Abstract) , 1995, CRYPTO.

[15]  Siu-Ming Yiu,et al.  Oblivious Transfer with Access Control : Realizing Disjunction without Duplication , 2010, Pairing.

[16]  Silvio Micali,et al.  How to play ANY mental game , 1987, STOC.

[17]  Abhi Shelat,et al.  Simulatable Adaptive Oblivious Transfer , 2007, EUROCRYPT.

[18]  Oded Goldreich,et al.  A randomized protocol for signing contracts , 1985, CACM.

[19]  Birgit Pfitzmann,et al.  Anonymous Fingerprinting , 1997, EUROCRYPT.

[20]  Hovav Shacham,et al.  Short Group Signatures , 2004, CRYPTO.

[21]  Fangguo Zhang,et al.  Oblivious Transfer with Complex Attribute-Based Access Control , 2010, ICISC.

[22]  Ki-Ryong Kwon,et al.  Analysis of COT-based Fingerprinting Schemes: New Approach to Design Practical and Secure Fingerprinting Scheme , 2004, Information Hiding.

[23]  Kaoru Kurosawa,et al.  Oblivious keyword search , 2004, J. Complex..

[25]  David Chaum,et al.  Group Signatures , 1991, EUROCRYPT.

[26]  Lihua Liu,et al.  Improvement of One Adaptive Oblivious Transfer Scheme , 2013, IACR Cryptol. ePrint Arch..

[27]  Jan Camenisch Efficient Anonymous Fingerprinting with Group Signatures , 2000, ASIACRYPT.

[28]  Dan Collusion-Secure Fingerprinting for Digital Data , 2002 .

[29]  Moni Naor,et al.  Oblivious Transfer with Adaptive Queries , 1999, CRYPTO.

[30]  Yuval Ishai,et al.  Priced Oblivious Transfer: How to Sell Digital Goods , 2001, EUROCRYPT.

[31]  Javier Herranz Restricted adaptive oblivious transfer , 2011, Theor. Comput. Sci..

[32]  Birgit Pfitzmann,et al.  Asymmetric Fingerprinting (Extended Abstract) , 1996, EUROCRYPT.