Using a Formal Analysis Technique to Identify an Unbinding Attack on a Buyer-Seller Watermarking Protocol

被引:0
|
作者
Williams, David M. [1 ]
Treharne, Helen [1 ]
Ho, Anthony T. S. [1 ]
Culnane, Chris [1 ]
机构
[1] Univ Surrey, Dept Comp, Guildford GU2 7XH, Surrey, England
关键词
Buyer-Seller Watermarking Protocol; Formal Model; Formal Analysis; CSP; Unbinding; Customers' Rights;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper we provide a novel approach to the analysis of buyer-seller watermarking protocols by tailoring an existing formal technique that has not previously been used in this context. We accurately represent a buyer-seller watermarking protocol as proposed by Ibrahim et al. [6] by constructing a model using the process algebra CSP. By describing our model in this manner and utilising the tool support associated with CSP we are able to conduct a thorough analysis of all the possible behaviour in the protocol. Through formal analysis we have discovered an unbinding attack on the protocol. In this paper we also highlight other weaknesses that exist in the protocol and propose verifiable solutions to correct these weaknesses.
引用
收藏
页码:205 / 213
页数:9
相关论文
共 50 条
  • [31] A New Buyer-Seller Watermarking Protocol Without Double Embedding
    曾鹏
    曹珍富
    林煌
    [J]. Journal of Shanghai Jiaotong University(Science), 2010, 15 (04) : 397 - 402
  • [32] Comments on a buyer-seller watermarking protocol for large scale networks
    Wu, Shuhua
    Pu, Qiong
    [J]. International Journal of Network Security, 2012, 14 (01) : 53 - 58
  • [33] A New Buyer-Seller Watermarking Protocol with Discrete Cosine Transform
    Kumar, Ashwani
    Ansari, Mohd Dilshad
    Ali, Jabir
    Kumar, Kapil
    [J]. COMPUTER NETWORKS AND INFORMATION TECHNOLOGIES, 2011, 142 : 468 - 471
  • [34] A new buyer-seller watermarking protocol without double embedding
    Zeng P.
    Cao Z.-F.
    Lin H.
    [J]. Journal of Shanghai Jiaotong University (Science), 2010, 15 (4) : 397 - 402
  • [35] A New and Efficient Buyer-Seller Digital Watermarking Protocol Using Identity Based Technique for Copyright Protection
    Kumar, Ashwani
    Ghrera, S. P.
    Tyagi, Vipin
    [J]. 2015 THIRD INTERNATIONAL CONFERENCE ON IMAGE INFORMATION PROCESSING (ICIIP), 2015, : 531 - 535
  • [36] Cryptanalysis of a generalized anonymous buyer-seller watermarking protocol of IWDW 2004
    Goi, BM
    Phan, RCW
    Siddiqi, MU
    [J]. EMBEDDED AND UBIQUITOUS COMPUTING - EUC 2005 WORKSHOPS, PROCEEDINGS, 2005, 3823 : 936 - 944
  • [37] An Efficient Buyer-Seller Watermarking Protocol Based on Composite Signal Representation
    Deng, Mina
    Bianchi, Tiziano
    Piva, Alessandro
    Preneel, Bart
    [J]. MM&SEC'09: PROCEEDINGS OF THE 2009 ACM SIGMM MULTIMEDIA AND SECURITY WORKSHOP, 2009, : 9 - 18
  • [38] A new buyer-seller watermarking protocol without multiple watermarks insertion
    Jyun-Ci Huang
    Fuh-Gwo Jeng
    Tzung-Her Chen
    [J]. Multimedia Tools and Applications, 2017, 76 : 9667 - 9679
  • [39] A new buyer-seller watermarking protocol without multiple watermarks insertion
    Huang, Jyun-Ci
    Jeng, Fuh-Gwo
    Chen, Tzung-Her
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (07) : 9667 - 9679
  • [40] IDENTIFY NEGOTIATIONS IN BUYER-SELLER INTERACTIONS
    WOODSIDE, AG
    TAYLOR, JL
    [J]. ADVANCES IN CONSUMER RESEARCH, 1985, 12 : 444 - 449