Presentation | 2003/7/11 Secure Anonymous Buyer-Seller Watermarking Protocol Against Conspiracy Attack Jae-Gwi Choi, Kouichi Sakurai, Ji-Hwan Park, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | Copyright marking schemes are techniques applied to protect the copyright on digital contents. They are the embedding of marks into digital contents that can later be detected to identify owners (watermarking) or recipients (fingerprinting) of the content. Anonymous buyer-seller watermarking protocol allows the buyers to purchase watermarked contents anonymously. However, on illegal redistribution the anonymity can be revoked. In this paper we show serious shortcomings of recent proposals on anonymous buyer-seller watermarking protocol. The problem is that it allows the seller to cheat honest buyers. Thus, if another copy with specific watermark turns up, one cannot assign responsibility to one of the buyer and the seller. In this paper, we present secure buyer-seller watermarking protocol using commutative cryptosystems, which prevents the buyer from cheating honest buyers. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | Digital watermarking / digital fingerprinting / copyright violators / conspiracy attack / commutative cryptosystems |
Paper # | ISEC2003-40 |
Date of Issue |
Conference Information | |
Committee | ISEC |
---|---|
Conference Date | 2003/7/11(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Information Security (ISEC) |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | Secure Anonymous Buyer-Seller Watermarking Protocol Against Conspiracy Attack |
Sub Title (in English) | |
Keyword(1) | Digital watermarking |
Keyword(2) | digital fingerprinting |
Keyword(3) | copyright violators |
Keyword(4) | conspiracy attack |
Keyword(5) | commutative cryptosystems |
1st Author's Name | Jae-Gwi Choi |
1st Author's Affiliation | Department of Information Security, Pukyong national university() |
2nd Author's Name | Kouichi Sakurai |
2nd Author's Affiliation | Faculty of Computer Science and Communication Engineering, Kyushu university |
3rd Author's Name | Ji-Hwan Park |
3rd Author's Affiliation | Department of Information Security, Pukyong national university |
Date | 2003/7/11 |
Paper # | ISEC2003-40 |
Volume (vol) | vol.103 |
Number (no) | 196 |
Page | pp.pp.- |
#Pages | 8 |
Date of Issue |