1994-01-01 - Re: Anonymous Video on Demand

Header Data

From: jim@bilbo.suite.com (Jim Miller)
To: cypherpunks@toad.com
Message Hash: 00aaf58cc01e9fa176888aa29ea6968219f8c8ff8d9332de638b7f3c813b4961
Message ID: <9401010055.AA27523@bilbo.suite.com>
Reply To: N/A
UTC Datetime: 1994-01-01 00:58:36 UTC
Raw Date: Fri, 31 Dec 93 16:58:36 PST

Raw message

From: jim@bilbo.suite.com (Jim Miller)
Date: Fri, 31 Dec 93 16:58:36 PST
To: cypherpunks@toad.com
Subject: Re: Anonymous Video on Demand
Message-ID: <9401010055.AA27523@bilbo.suite.com>
MIME-Version: 1.0
Content-Type: text/plain


could
As I think about it more, the "anonymous video on demand" problem can be  
solved with an oblivious transfer protocol.

Here's how I see it working:

(The following is adapted from the oblivious transfer protocol described  
in "Applied Cryptography" on page 98.)

Say Alice is the Video Vendor and Bob is the customer...

Alice generates a public/private key pair for each movie in her video  
database and publishes the public keys in an electronic catalog.  Each  
public key would be paired with a movie description and a catalog index  
number.

Bob downloads Alice's catalog and browses through it offline.  Bob makes a  
selection, and also randomly picks 99 (or any large number) other catalog  
numbers

Bob generates a random DES key and encrypts this key with the public key  
associated with his selection.

Bob sends the encrypted DES key and the list of 100 catalog numbers to  
Alice.

Alice decrypts the DES key with the private key associated each catalog  
number received from Bob.  In only one case will Alice successfully  
recover Bob's DES key, only she doesn't know which case.

Alice encrypts each movie selection with the resulting DES keys from the  
previous step and sends all 100 encrypted movies to Bob.

Bob will only be able to decrypt and view the movie he selected and Alice  
wont know which of the 100 movies Bob selected.

Ta Da!

The nice thing about this protocol is that it doesn't really have anything  
to do with videos.  It could be used for an electronic library, or any  
warehouse of digital information where the Vendor wishes to charge for a  
download, yet the Customer doesn't want the Vendor to know which item is  
selected.

Also, the Vendor still can use statistical analysis to determine which  
items are more popular and which items are less popular.  The Vendor could  
keep track of how many times an item was mentioned in a Customer selection  
list.  The more popular items would appear in more lists.  Unpopular items  
would have different statistics.  This analysis breaks down if all items  
are equally popular, or Customers don't chose the other 99 items randomly.


Jim_Miller@suite.com







Thread