Using a Formal Analysis Technique to Identify an Unbinding Attack on a Buyer-Seller Watermarking Protocol

被引:0
|
作者
Williams, David M. [1 ]
Treharne, Helen [1 ]
Ho, Anthony T. S. [1 ]
Culnane, Chris [1 ]
机构
[1] Univ Surrey, Dept Comp, Guildford GU2 7XH, Surrey, England
关键词
Buyer-Seller Watermarking Protocol; Formal Model; Formal Analysis; CSP; Unbinding; Customers' Rights;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper we provide a novel approach to the analysis of buyer-seller watermarking protocols by tailoring an existing formal technique that has not previously been used in this context. We accurately represent a buyer-seller watermarking protocol as proposed by Ibrahim et al. [6] by constructing a model using the process algebra CSP. By describing our model in this manner and utilising the tool support associated with CSP we are able to conduct a thorough analysis of all the possible behaviour in the protocol. Through formal analysis we have discovered an unbinding attack on the protocol. In this paper we also highlight other weaknesses that exist in the protocol and propose verifiable solutions to correct these weaknesses.
引用
收藏
页码:205 / 213
页数:9
相关论文
共 50 条
  • [21] A Provably Secure Anonymous Buyer-Seller Watermarking Protocol
    Rial, Alfredo
    Deng, Mina
    Bianchi, Tiziano
    Piva, Alessandro
    Preneel, Bart
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2010, 5 (04) : 920 - 931
  • [22] A Buyer-Seller Watermarking Protocol Based on Secure Embedding
    Katzenbeisser, Stefan
    Lemma, Aweke
    Celik, Mehmet Utku
    van der Veen, Michiel
    Maas, Martijn
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2008, 3 (04) : 783 - 786
  • [23] An anonymous buyer-seller watermarking protocol with anonymity control
    Ju, HS
    Kim, HJ
    Lee, DH
    Lim, JI
    [J]. INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2002, 2002, 2587 : 421 - 432
  • [24] Anonymous buyer-seller watermarking protocol with additive homomorphism
    Deng, Mina
    Weng, Li
    Preneel, Bart
    [J]. SIGMAP 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND MULTIMEDIA APPLICATIONS, 2008, : 300 - 307
  • [25] A buyer-seller watermarking protocol for digital secondary market
    Chunlin Song
    Jie Sang
    Sud Sudirman
    [J]. Multimedia Tools and Applications, 2018, 77 : 225 - 249
  • [26] Analysis of a Buyer-Seller Watermarking Protocol for Trustworthy Purchasing of Digital Contents
    Phan, Raphael C. -W.
    Goi, Bok-Min
    Poh, Geong-Sen
    Kim, Jongsung
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2011, 56 (01) : 73 - 83
  • [27] A buyer-seller watermarking protocol for digital secondary market
    Song, Chunlin
    Sang, Jie
    Sudirman, Sud
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (01) : 225 - 249
  • [28] A web oriented and interactive buyer-seller watermarking protocol
    Frattolillo, F
    D'Onofrio, S
    [J]. SECURITY, STEGANOGRAPHY, AND WATERMARKING OF MULTIMEDIA CONTENTS VIII, 2006, 6072
  • [29] Effective watermarking scheme in the encrypted domain for buyer-seller watermarking protocol
    Zhao, Bin
    Kou, Weidong
    Li, Hui
    Dang, Lanjun
    Zhang, Jun
    [J]. INFORMATION SCIENCES, 2010, 180 (23) : 4672 - 4684
  • [30] An Efficient Buyer-Seller Watermarking Protocol Based on Chameleon Encryption
    Sen Poh, Geong
    Martin, Keith M.
    [J]. DIGITAL WATERMARKING, 2009, 5450 : 433 - 447