An Efficient Buyer-Seller Watermarking Protocol Based on Chameleon Encryption

被引:0
|
作者
Sen Poh, Geong [1 ]
Martin, Keith M. [1 ]
机构
[1] Univ London, Egham TW20 0EX, Surrey, England
来源
DIGITAL WATERMARKING | 2009年 / 5450卷
关键词
SECURE;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Buyer-seller watermarking protocols are designed to deter clients from illegally distributing copies of digital content. This is achieved by allowing a distribution to insert a unique watermark into content in such a way that the distributor does not know the final watermarked copy that is given to the client. This protects both the client and distributor from attempts by one to falsely accuse the other of misuse. Buyer-seller watermarking protocols are normally based on asymmetric cryptographic primitives known as homomorphic encryption schemes. However, the computational and communication overhead of this conventional approach is high. In this paper we propose a, different approach, based on the symmetric Chameleon encryption scheme. We show that this leads to significant, gains in computational and operational efficiency.
引用
收藏
页码:433 / 447
页数:15
相关论文
共 50 条
  • [41] A Privacy-Preserving Buyer-Seller Watermarking Protocol Based on Priced Oblivious Transfer
    Rial, Alfredo
    Balasch, Josep
    Preneel, Bart
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (01) : 202 - 212
  • [42] On the (in)security of two buyer-seller watermarking protocols
    Sen Poh, Geong
    Martin, Keith M.
    [J]. SECRYPT 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2008, : 253 - 260
  • [43] A generalization of an anonymous buyer-seller watermarking protocol and its application to mobile communications
    Choi, J
    Park, J
    [J]. DIGITAL WATERMARKING, 2005, 3304 : 232 - 243
  • [44] Towards transferable watermarks in buyer-seller watermarking protocols
    Terelius, Bjorn
    [J]. PROCEEDINGS OF THE 2013 IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS'13), 2013, : 197 - 202
  • [45] Geometric Multiple Watermarking Scheme for Mobile 3D Content Based on Anonymous Buyer-Seller Watermarking Protocol
    Lee, Suk-Hwan
    Kwon, Seong-Geun
    Kwon, Ki-Ryong
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2014, 8 (02): : 504 - 523
  • [46] Formal Analysis of Two Buyer-Seller Watermarking Protocols
    Williams, David M.
    Treharne, Helen
    Ho, Anthony T. S.
    Waller, Adrian
    [J]. DIGITAL WATERMARKING, 2009, 5450 : 278 - +
  • [47] An enhanced buyer seller watermarking protocol
    Chang, CC
    Chung, CY
    [J]. 2003 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOL 1 AND 2, PROCEEDINGS, 2003, : 1779 - 1783
  • [48] An Efficient and Secure Buyer-Seller Networking Protocol for Anonymous Digital Transaction
    Das, Vinu V.
    Thankachan, Nessy
    [J]. IIT: 2008 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION TECHNOLOGY, 2008, : 188 - +
  • [49] Using a Formal Analysis Technique to Identify an Unbinding Attack on a Buyer-Seller Watermarking Protocol
    Williams, David M.
    Treharne, Helen
    Ho, Anthony T. S.
    Culnane, Chris
    [J]. MM&SEC'08: PROCEEDINGS OF THE MULTIMEDIA & SECURITY WORKSHOP 2008, 2008, : 205 - 213
  • [50] A Secure Watermarking Scheme for Buyer-Seller Identification and Copyright Protection
    Fawad Ahmed
    Farook Sattar
    Mohammed Yakoob Siyal
    Dan Yu
    [J]. EURASIP Journal on Advances in Signal Processing, 2006