Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and an Improvement for True Anonymity

By combining techniques of watermarking and fingerprinting, a sound buyer-seller watermarking protocol can address the issue of copyright protection in e-commerce. In this paper, we analyze the security of two recent anonymous buyer-seller watermarking protocols proposed by Ju et. al and Choi et. al...

Full description

Saved in:
Bibliographic Details
Main Authors: GOI, Bok-Min, PHAN, Raphael C. W., YANG, Yanjiang, BAO, Feng, DENG, Robert H., Siddiqi, M. U.
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2004
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/1073
https://ink.library.smu.edu.sg/context/sis_research/article/2072/viewcontent/Goi2004_CryptanalysisOfTwoAnonymousBuyer_pv.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-2072
record_format dspace
spelling sg-smu-ink.sis_research-20722022-02-18T02:55:57Z Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and an Improvement for True Anonymity GOI, Bok-Min PHAN, Raphael C. W. YANG, Yanjiang BAO, Feng DENG, Robert H. Siddiqi, M. U. By combining techniques of watermarking and fingerprinting, a sound buyer-seller watermarking protocol can address the issue of copyright protection in e-commerce. In this paper, we analyze the security of two recent anonymous buyer-seller watermarking protocols proposed by Ju et. al and Choi et. al respectively, and prove that they do not provide the features and security as claimed. In particular, we show that i) the commutative cryptosystem used in Choi et. als protocol fails to prevent the watermark certification authority (WCA) from discovering the watermark (fingerprint) chosen by the buyer; ii) for both protocols, the seller can discover the watermark chosen by the buyer if he colludes with the WCA. Hence, these protocols cannot guard against conspiracy attacks. We further show that these protocols only provide partial anonymity, ie. the buyers anonymity is guaranteed only if WCA is honest. Our results suggest that the security of these protocols must assume the honesty of WCA, contrary to the designers original claim. Finally, we propose a new anonymous buyer-seller watermarking protocol which is more secure and efficient, and provides true anonymity. 2004-06-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/1073 info:doi/10.1007/978-3-540-24852-1_27 https://ink.library.smu.edu.sg/context/sis_research/article/2072/viewcontent/Goi2004_CryptanalysisOfTwoAnonymousBuyer_pv.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Watermarking Fingerprinting Traitor Tracing Copyright Protection Anonymity Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Watermarking
Fingerprinting
Traitor Tracing
Copyright Protection
Anonymity
Information Security
spellingShingle Watermarking
Fingerprinting
Traitor Tracing
Copyright Protection
Anonymity
Information Security
GOI, Bok-Min
PHAN, Raphael C. W.
YANG, Yanjiang
BAO, Feng
DENG, Robert H.
Siddiqi, M. U.
Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and an Improvement for True Anonymity
description By combining techniques of watermarking and fingerprinting, a sound buyer-seller watermarking protocol can address the issue of copyright protection in e-commerce. In this paper, we analyze the security of two recent anonymous buyer-seller watermarking protocols proposed by Ju et. al and Choi et. al respectively, and prove that they do not provide the features and security as claimed. In particular, we show that i) the commutative cryptosystem used in Choi et. als protocol fails to prevent the watermark certification authority (WCA) from discovering the watermark (fingerprint) chosen by the buyer; ii) for both protocols, the seller can discover the watermark chosen by the buyer if he colludes with the WCA. Hence, these protocols cannot guard against conspiracy attacks. We further show that these protocols only provide partial anonymity, ie. the buyers anonymity is guaranteed only if WCA is honest. Our results suggest that the security of these protocols must assume the honesty of WCA, contrary to the designers original claim. Finally, we propose a new anonymous buyer-seller watermarking protocol which is more secure and efficient, and provides true anonymity.
format text
author GOI, Bok-Min
PHAN, Raphael C. W.
YANG, Yanjiang
BAO, Feng
DENG, Robert H.
Siddiqi, M. U.
author_facet GOI, Bok-Min
PHAN, Raphael C. W.
YANG, Yanjiang
BAO, Feng
DENG, Robert H.
Siddiqi, M. U.
author_sort GOI, Bok-Min
title Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and an Improvement for True Anonymity
title_short Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and an Improvement for True Anonymity
title_full Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and an Improvement for True Anonymity
title_fullStr Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and an Improvement for True Anonymity
title_full_unstemmed Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and an Improvement for True Anonymity
title_sort cryptanalysis of two anonymous buyer-seller watermarking protocols and an improvement for true anonymity
publisher Institutional Knowledge at Singapore Management University
publishDate 2004
url https://ink.library.smu.edu.sg/sis_research/1073
https://ink.library.smu.edu.sg/context/sis_research/article/2072/viewcontent/Goi2004_CryptanalysisOfTwoAnonymousBuyer_pv.pdf
_version_ 1770570846900846592