Advertisement

A Generalization of an Anonymous Buyer-Seller Watermarking Protocol and Its Application to Mobile Communications

  • JaeGwi Choi
  • JiHwan Park
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3304)

Abstract

Buyer-seller watermarking schemes enable sellers to identify the buyer of illegally distributed contents by providing each buyer with a slightly different version. To protect the privacy of buyers, buyers’ purchase should be done anonymously, and unlinkability of contents purchased should be satisfied. In this paper, our concern is to generalize a buyer-seller watermarking protocol to multi-purchase environments. The problem of most schemes in the literature is that the number of keys held by buyer’s devices increases in proportion to that of contents purchased, if we apply it to multi-purchase case. Otherwise, they cannot provide unlinkability. We propose an efficient multi-purchase buyer-seller watermarking protocol satisfying anonymity and unlinkability, where a buyer executes registration step one time and the number of buyer’s necessary key is also one regardless of that of contents. Our second concern is to extend this scheme to the mobile communications. Our scheme reduces amount of buyers’ computations to the minimum by introducing a concept of mobile agents.

Keywords

Copyright protection buyer-seller watermarking mobile communications unlinkability 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Qian, L., Nahrstedt, K.: Watermarking Schemes and Protocols for Protecting Rightful Ownership and Customer’s Rights. J. Visual Commun. Image Represent 9, 194–210 (1998)CrossRefGoogle Scholar
  2. 2.
    Memon, N., Wong, P.W.: A Buyer-Seller Watermarking Protocol. IEEE Transactions on image processing 10(4), 643–649 (2001)CrossRefzbMATHGoogle Scholar
  3. 3.
    Pfitzmann, B., Waidner, M.: Anonymous Fingerprinting. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 88–102. Springer, Heidelberg (1997)CrossRefGoogle Scholar
  4. 4.
    Domingo-Ferrer, J.: Anonymous Fingerprinting Based on Committed Oblivious Transfer. In: Imai, H., Zheng, Y. (eds.) PKC 1999. LNCS, vol. 1560, pp. 43–52. Springer, Heidelberg (1999)CrossRefGoogle Scholar
  5. 5.
    Pfitzman, B., Sadeghi, A.-R.: Coin-Based Anonymous Fingerprinting. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 150–164. Springer, Heidelberg (1999)CrossRefGoogle Scholar
  6. 6.
    Ju, H.-S., Kim, H.-J., Lee, D.-H., Lim, J.-I.: An Anonymous Buyer-Seller Watermarking Protocol with Anonymity Control. In: Lee, P.J., Lim, C.H. (eds.) ICISC 2002. LNCS, vol. 2587, pp. 421–432. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  7. 7.
    Nakanish, T., Haruna, N., Sugiyama, Y.: Unlinkable Electronic Coupon Protocol with Anonymity Control. In: Zheng, Y., Mambo, M. (eds.) ISW 1999. LNCS, vol. 1729, pp. 37–46. Springer, Heidelberg (1999)CrossRefGoogle Scholar
  8. 8.
    Chaum, D., Evertse, J.H., Van De Graaf, J.: An Improved Protocol for Demonstrating Possession of Discrete Logarithms and Some Generalization. In: Price, W.L., Chaum, D. (eds.) EUROCRYPT 1987. LNCS, vol. 304, pp. 127–141. Springer, Heidelberg (1988)CrossRefGoogle Scholar
  9. 9.
    Romao, A., da Silva, M.M.: Secure Mobile Agent Digital Signatures with Proxy Certificates. In: Liu, J., Ye, Y. (eds.) E-Commerce Agents. LNCS (LNAI), vol. 2033, pp. 206–220. Springer, Heidelberg (2001)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • JaeGwi Choi
    • 1
  • JiHwan Park
    • 1
  1. 1.Dept. of Information SecurityPukyong National Univ.BusanKorea

Personalised recommendations