Attacks On Two Buyer-Seller Watermarking Protocols And An Improvement For Revocable Anonymity

被引:9
|
作者
Deng, Mina [1 ]
Preneel, Bart [2 ]
机构
[1] Katholieke Univ Leuven, ESAT SCD COSIC, B-3001 Heverlee, Belgium
[2] IBBT, B-9050 Ghent, Belgium
关键词
D O I
10.1109/ISECS.2008.103
中图分类号
F [经济];
学科分类号
02 ;
摘要
Buyer-seller watermarking protocols incorporate digital watermarking with cryptography, in order to protect digital copyrights and privacy rights for the seller and the buyer before, during, and after trading activities in e-commerce. In this paper, we present attacks on two recently proposed buyer-seller watermarking protocols, and prove that these protocols are not able to provide security for both the buyer and the seller simultaneously. Further, we point out that both protocols don't function properly when employing homomorphic probabilistic cryptosystems. We also show that the buyer's anonymity and/or the transaction unlinkability is not achieved in these protocols. We propose an improved secure and anonymous buyer-seller protocol, which is secure and fair for both the seller and the buyer In contrast to early work, our scheme is able to provide all the security properties that a secure buyer-seller watermarking protocol is expected to hold.
引用
收藏
页码:923 / +
页数:2
相关论文
共 50 条
  • [1] Cryptanalysis of two anonymous buyer-seller watermarking protocols and an improvement for true anonymity
    Goi, BM
    Phan, RCW
    Yang, YJ
    Bao, F
    Deng, RH
    Siddiqi, MU
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2004, 3089 : 369 - 382
  • [2] On the (in)security of two buyer-seller watermarking protocols
    Sen Poh, Geong
    Martin, Keith M.
    [J]. SECRYPT 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2008, : 253 - 260
  • [3] Formal Analysis of Two Buyer-Seller Watermarking Protocols
    Williams, David M.
    Treharne, Helen
    Ho, Anthony T. S.
    Waller, Adrian
    [J]. DIGITAL WATERMARKING, 2009, 5450 : 278 - +
  • [4] An anonymous buyer-seller watermarking protocol with anonymity control
    Ju, HS
    Kim, HJ
    Lee, DH
    Lim, JI
    [J]. INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2002, 2002, 2587 : 421 - 432
  • [5] Cloud-based Buyer-Seller Watermarking Protocols
    Peng, Yi-Jia
    Hsieh, Yung-Chen
    Hsueh, Chih-Wen
    Wu, Ja-Ling
    [J]. 2017 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTED, SCALABLE COMPUTING & COMMUNICATIONS, CLOUD & BIG DATA COMPUTING, INTERNET OF PEOPLE AND SMART CITY INNOVATION (SMARTWORLD/SCALCOM/UIC/ATC/CBDCOM/IOP/SCI), 2017,
  • [6] Towards transferable watermarks in buyer-seller watermarking protocols
    Terelius, Bjorn
    [J]. PROCEEDINGS OF THE 2013 IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS'13), 2013, : 197 - 202
  • [7] A buyer-seller watermarking protocol
    Memon, N
    Wong, PW
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 2001, 10 (04) : 643 - 649
  • [8] A buyer-seller watermarking protocol
    Memon, N
    Wong, PW
    [J]. 1998 IEEE SECOND WORKSHOP ON MULTIMEDIA SIGNAL PROCESSING, 1998, : 291 - 296
  • [9] On the Design of Buyer-Seller Watermarking Protocols without a Watermark Authority
    Sen Poh, Geong
    Martin, Keith M.
    [J]. E-BUSINESS AND TELECOMMUNICATIONS, 2009, 48 : 210 - 223
  • [10] Cryptanalysis of two non-anonymous buyer-seller watermarking protocols for content protection
    Goi, Bok-Min
    Phan, Raphael C. -W.
    Chuah, Hean-Teik
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2007, PT 1, PROCEEDINGS, 2007, 4705 : 951 - +