Abstract
By combining techniques of watermarking and fingerprinting, a sound buyer-seller watermarking protocol can address the issue of copyright protection in e-commerce. In this paper, we analyze the security of two recent anonymous buyer-seller watermarking protocols proposed by Ju et. al and Choi et. al respectively, and prove that they do not provide the features and security as claimed. In particular, we show that i) the commutative cryptosystem used in Choi et. al’s protocol fails to prevent the watermark certification authority (WCA) from discovering the watermark (fingerprint) chosen by the buyer; ii) for both protocols, the seller can discover the watermark chosen by the buyer if he colludes with the WCA. Hence, these protocols cannot guard against conspiracy attacks. We further show that these protocols only provide “partial” anonymity, ie. the buyer’s anonymity is guaranteed only if WCA is honest. Our results suggest that the security of these protocols must assume the honesty of WCA, contrary to the designers’ original claim. Finally, we propose a new anonymous buyer-seller watermarking protocol which is more secure and efficient, and provides true anonymity.
Chapter PDF
Similar content being viewed by others
References
Boneh, D., Shaw, J.: Collusion-Secure Fingerprinting for Digital Data. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 452–465. Springer, Heidelberg (1995)
Brickell, E.F., Yacobi, Y.: On Privacy Homormorphisms. In: Price, W.L., Chaum, D. (eds.) EUROCRYPT 1987. LNCS, vol. 304, pp. 117–125. Springer, Heidelberg (1988)
Chang, C.C., Chung, C.Y.: An Enhanced Buyer-Seller Watermarking Protocol. In: Proc. ICCT 2003, pp. 1779–1783 (2003)
Chaum, D.: An Improved Protocol for Demonstrating Possession of Discrete Logarithms and some Generalizations. In: Price, W.L., Chaum, D. (eds.) EUROCRYPT 1987. LNCS, vol. 304, pp. 127–141. Springer, Heidelberg (1988)
Cheung, S.-C., Leung, H.-F., Wang, C.: A Commutative Encrypted Protocol for the Privacy Protection of Watermarks in Digital Contents. In: Proc. 37th Hawaii International Conference on System Sciences, Hawaii, vol. 40094a (2004)
Choi, J.G., Sakurai, K., Park, J.H.: Does it Need Trusted Third Party? Design of Buyer-Seller Watermarking Protocol without Trusted Third Party. In: Zhou, J., Yung, M., Han, Y. (eds.) ACNS 2003. LNCS, vol. 2846, pp. 265–279. Springer, Heidelberg (2003)
Cohen, J.D., Fischer, M.J.: A Robust and Verifiable Cryptographically Secure Election Scheme. In: Proc. IEEE 26th Annu. Symp. Foundations Computer Science, Portland, pp. 372–382 (1985) (extended abstract)
Cox, I.J., Miller, M.L., Bloom, J.A.: Digital Watermarking. Morgan Kaufmann, San Francisco (2002)
Hartung, F., Kutter, M.: Multimedia Watermarking Techniques. Proc. IEEE 87, 1079–1107 (1999)
Ju, H.S., Kim, H.J., Lee, D.H., Lim, J.I.: An Anonymous Buyer-Seller Watermarking Protocol with Anonymity Control. In: Lee, P.J., Lim, C.H. (eds.) ICISC 2002. LNCS, vol. 2587, pp. 421–432. Springer, Heidelberg (2003)
Memon, N., Wong, P.W.: A Buyer-Seller Watermarking Protocol. IEEE Transactions on Image Processing 10(4), 643–649 (2001)
Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)
Pfitzman, B., Sadeghi, A.R.: Coin-Based Anonymous Fingerprinting. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 150–163. Springer, Heidelberg (1999)
Pfitzman, B., Schunter, M.: Asymmetric Fingerprinting. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 84–95. Springer, Heidelberg (1996)
Pfitzman, B., Waidner, W.: Anonymous Fingerprinting. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 88–102. Springer, Heidelberg (1997)
Rivest, R.L., Shamir, A., Adleman, L.: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM 21(2), 120–126 (1978)
Swanson, M., Kobayashi, M., Tewfik, A.: Multimedia Data Embedding and Watermarking Technologies. Proc. IEEE 86, 1064–1087 (1998)
Voyatzis, G., Pitas, I.: The Use of Watermarks in the Protection of Digital Multimedia Products. Proc. IEEE 87, 1197–1207 (1999)
Wagner, N.R.: Fingerprinting. In: IEEE Symposium on Security and Privacy, pp. 18–22 (1983)
Wolfang, R., Podilchuk, C., Delp, E.: Perceptual Watermarks for Digital Images and Video. Proc. IEEE 87, 1108–1126 (1999)
Zhao, J., Koch, E.: Embedding Robust Labels Into Images For Copyright Protection. In: International Congress on Intellectual Property Rights for Specialized Information, Knowledge and New Technologies, Vienna (1995)
Zhao, W., Varadharajan, V., Mu, Y.: A Secure Mental Poker Protocol Over the Internet. In: Australasian Information Security Workshop 2003, Conference in Research and Practice in Information Technology, February 2003, vol. 21 (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Goi, BM., Phan, R.C.W., Yang, Y., Bao, F., Deng, R.H., Siddiqi, M.U. (2004). Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and an Improvement for True Anonymity. In: Jakobsson, M., Yung, M., Zhou, J. (eds) Applied Cryptography and Network Security. ACNS 2004. Lecture Notes in Computer Science, vol 3089. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24852-1_27
Download citation
DOI: https://doi.org/10.1007/978-3-540-24852-1_27
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-22217-0
Online ISBN: 978-3-540-24852-1
eBook Packages: Springer Book Archive