Presentation 2003/7/11
Secure Anonymous Buyer-Seller Watermarking Protocol Against Conspiracy Attack
Jae-Gwi Choi, Kouichi Sakurai, Ji-Hwan Park,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) Copyright marking schemes are techniques applied to protect the copyright on digital contents. They are the embedding of marks into digital contents that can later be detected to identify owners (watermarking) or recipients (fingerprinting) of the content. Anonymous buyer-seller watermarking protocol allows the buyers to purchase watermarked contents anonymously. However, on illegal redistribution the anonymity can be revoked. In this paper we show serious shortcomings of recent proposals on anonymous buyer-seller watermarking protocol. The problem is that it allows the seller to cheat honest buyers. Thus, if another copy with specific watermark turns up, one cannot assign responsibility to one of the buyer and the seller. In this paper, we present secure buyer-seller watermarking protocol using commutative cryptosystems, which prevents the buyer from cheating honest buyers.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) Digital watermarking / digital fingerprinting / copyright violators / conspiracy attack / commutative cryptosystems
Paper # ISEC2003-40
Date of Issue

Conference Information
Committee ISEC
Conference Date 2003/7/11(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information Security (ISEC)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Secure Anonymous Buyer-Seller Watermarking Protocol Against Conspiracy Attack
Sub Title (in English)
Keyword(1) Digital watermarking
Keyword(2) digital fingerprinting
Keyword(3) copyright violators
Keyword(4) conspiracy attack
Keyword(5) commutative cryptosystems
1st Author's Name Jae-Gwi Choi
1st Author's Affiliation Department of Information Security, Pukyong national university()
2nd Author's Name Kouichi Sakurai
2nd Author's Affiliation Faculty of Computer Science and Communication Engineering, Kyushu university
3rd Author's Name Ji-Hwan Park
3rd Author's Affiliation Department of Information Security, Pukyong national university
Date 2003/7/11
Paper # ISEC2003-40
Volume (vol) vol.103
Number (no) 196
Page pp.pp.-
#Pages 8
Date of Issue