ON THE IMPORTANCE OF ONE-TIME KEY PAIRS IN BUYER-SELLER WATERMARKING PROTOCOLS

David M. Williams, Helen Treharnea, Anthony T. S. Ho

2010

Abstract

In this paper we emphasize the importance of unique certified one-time key pairs in Buyer-Seller Watermarking (BSW) protocols. We distinguish between reactive unbinding attacks, in which the seller reacts to illicit file sharing by fabricating further evidence of such activity, and pre-emptive unbinding attacks, in which the seller gains an advantage by taking action that pre-empts the file being shared. We demonstrate the importance of certified one-time key pairs in the BSWprotocol by Lei et al., for protecting against pre-emptive unbinding attacks, and subsequently reveal a new attack on a recently published BSW protocol due to its omission of unique key pairs.

References

  1. Barni, M. and Bartolini, F. (2004). Watermarking Systems Engineering. Marcel Dekker, Inc.
  2. Deng, M. and Preneel, B. (2008). Attacks on two buyerseller watermarking protocols and an improvement for revocable anonymity. Electronic Commerce and Security, International Symposium, 0:923-929.
  3. Hu, Y. and Zhang, J. (2009). A secure and efficient buyerseller watermarking protocol. Journal of Multimedia, 4(3):161-168.
  4. Ibrahim, I. M., El-Din, S. H. N., and Hegazy, A. F. A. (2007). An effective and secure buyer seller watermarking protocol. In Third International Symposium on Information Assurance and Security, pages 21-28.
  5. Ju, H. S., Kim, H. J., Lee, D. H., and Lim, J. I. (2003). An anonymous buyer-seller watermarking protocol with anonymity control. In International Conference on Information Security and Cryptology, pages 421-432.
  6. Lei, C. L., Yu, P. L., Tsai, P. L., and Chan, M. H. (2004). An efficient and anonymous buyer-seller watermarking protocol. IEEE Transactions on Image Processing, 13(12):1618-1626.
  7. Mauw, S. and Bos, V. (2001). Drawing Message Sequence Charts with LATEX. TUGBoat, 22(1-2):87-92.
  8. Memon, N. and Wong, P. W. (2001). A buyer seller watermarking protocol. IEEE Transactions on Image Processing, 10(4):643-649.
  9. Poh, G. S. and Martin, K. M. (2007). A framework for design and analysis of asymmetric fingerprinting protocols. In Third International Symposium on Information Assurance and Security, pages 457-461.
  10. Poh, G. S. and Martin, K. M. (2008). On the (in)security of two buyer-seller watermarking protocols. In SECRYPT 2008 - International Conference on Security and Cryptography, pages 253-260.
  11. Qiao, L. and Nahrstedt, K. (1998). Watermarking schemes and protocols for protecting rightful ownership and customer's rights. Journal of Visual Communication and Image Representation, 9(3):194-210.
  12. Shao, M. H. (2007). A privacy-preserving buyer-seller watermarking protocol with semi-trust third party. In Trust, Privacy and Security in Digital Business, pages 44-53.
  13. Williams, D. M., Treharne, H., Ho, A. T. S., and Culnane, C. (2008a). Using a formal analysis technique to identify an unbinding attack on a buyer-seller watermarking protocol. In 10th ACM Workshop on Multimedia and Security, pages 205-214.
  14. Williams, D. M., Treharne, H., Ho, A. T. S., and Waller, A. (2008b). Formal analysis of two buyer-seller watermarking protocols. In 7th International Workshop on Digital Watermarking, pages 278-292.
Download


Paper Citation


in Harvard Style

M. Williams D., Treharnea H. and T. S. Ho A. (2010). ON THE IMPORTANCE OF ONE-TIME KEY PAIRS IN BUYER-SELLER WATERMARKING PROTOCOLS . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2010) ISBN 978-989-8425-18-8, pages 441-446. DOI: 10.5220/0002978704410446


in Bibtex Style

@conference{secrypt10,
author={David M. Williams and Helen Treharnea and Anthony T. S. Ho},
title={ON THE IMPORTANCE OF ONE-TIME KEY PAIRS IN BUYER-SELLER WATERMARKING PROTOCOLS},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2010)},
year={2010},
pages={441-446},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002978704410446},
isbn={978-989-8425-18-8},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2010)
TI - ON THE IMPORTANCE OF ONE-TIME KEY PAIRS IN BUYER-SELLER WATERMARKING PROTOCOLS
SN - 978-989-8425-18-8
AU - M. Williams D.
AU - Treharnea H.
AU - T. S. Ho A.
PY - 2010
SP - 441
EP - 446
DO - 10.5220/0002978704410446