Using a Formal Analysis Technique to Identify an Unbinding Attack on a Buyer-Seller Watermarking Protocol

被引:0
|
作者
Williams, David M. [1 ]
Treharne, Helen [1 ]
Ho, Anthony T. S. [1 ]
Culnane, Chris [1 ]
机构
[1] Univ Surrey, Dept Comp, Guildford GU2 7XH, Surrey, England
关键词
Buyer-Seller Watermarking Protocol; Formal Model; Formal Analysis; CSP; Unbinding; Customers' Rights;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper we provide a novel approach to the analysis of buyer-seller watermarking protocols by tailoring an existing formal technique that has not previously been used in this context. We accurately represent a buyer-seller watermarking protocol as proposed by Ibrahim et al. [6] by constructing a model using the process algebra CSP. By describing our model in this manner and utilising the tool support associated with CSP we are able to conduct a thorough analysis of all the possible behaviour in the protocol. Through formal analysis we have discovered an unbinding attack on the protocol. In this paper we also highlight other weaknesses that exist in the protocol and propose verifiable solutions to correct these weaknesses.
引用
收藏
页码:205 / 213
页数:9
相关论文
共 50 条
  • [1] A buyer-seller watermarking protocol
    Memon, N
    Wong, PW
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 2001, 10 (04) : 643 - 649
  • [2] A buyer-seller watermarking protocol
    Memon, N
    Wong, PW
    [J]. 1998 IEEE SECOND WORKSHOP ON MULTIMEDIA SIGNAL PROCESSING, 1998, : 291 - 296
  • [3] Formal Analysis of Two Buyer-Seller Watermarking Protocols
    Williams, David M.
    Treharne, Helen
    Ho, Anthony T. S.
    Waller, Adrian
    [J]. DIGITAL WATERMARKING, 2009, 5450 : 278 - +
  • [4] A Lightweight Buyer-Seller Watermarking Protocol
    Wu, Yongdong
    Pang, Hweehua
    [J]. ADVANCES IN MULTIMEDIA, 2008, 2008
  • [5] Research on secure buyer-seller watermarking protocol
    Liu Quan
    [J]. Journal of Systems Engineering and Electronics, 2008, (02) : 370 - 376
  • [6] A Secure and Efficient Buyer-seller Watermarking Protocol
    Fu, Lingyun
    Hu, Defa
    Wang, Xiaoliang
    Chen, Jianli
    [J]. MECHANICAL ENGINEERING AND GREEN MANUFACTURING, PTS 1 AND 2, 2010, : 898 - +
  • [7] A secure and practical buyer-seller watermarking protocol
    Hu, Defa
    Li, Qiaoliang
    [J]. MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 105 - +
  • [8] A Verifiable and Secret Buyer-Seller Watermarking Protocol
    Chen, Chin-Ling
    Chen, Chin-Chang
    Li, De-Kui
    Chen, Po-Yueh
    [J]. IETE TECHNICAL REVIEW, 2015, 32 (02) : 104 - 113
  • [9] Research on secure buyer-seller watermarking protocol
    Quan, Liu
    Zheng, Chen
    Zude, Zhou
    [J]. JOURNAL OF SYSTEMS ENGINEERING AND ELECTRONICS, 2008, 19 (02) : 370 - +
  • [10] On secure and anonymous buyer-seller watermarking protocol
    Deng, Mina
    Preneel, Bart
    [J]. 2008 3RD INTERNATIONAL CONFERENCE ON INTERNET AND WEB APPLICATIONS AND SERVICES (ICIW 2008), 2008, : 524 - +