Attacks. In Preneel, B., editor, Advances in Cryp-
tology - EUROCRYPT 2000, volume 1807 of Lecture
Notes in Computer Science, pages 139–155. Springer-
Verlag.
Blakley, G. R., Meadows, C., and Purdy, G. B. (1985). Fin-
gerprinting Long Forgiving Messages. In Williams,
H. C., editor, Advances in Cryptology - CRYPTO
1985, volume 218 of Lecture Notes in Computer Sci-
ence, pages 180–189. Springer-Verlag.
Boyd, C. and Mathuria, A. (2003). Protocols for Authenti-
cation and Key Establishment. Information Security
and Cryptography Series, Springer-Verlag.
Camenisch, J. (2000). Efficient Anonymous Fingerprint-
ing with Group Signatures. In Okamoto, T., editor,
Advances in Cryptology - ASIACRYPT 2000, volume
1976 of Lecture Notes in Computer Science, pages
415–428. Springer-Verlag.
Choi, J.-G., Sakurai, K., and Park, J.-H. (2003). Does It
Need Trusted Third Party? Design of Buyer-Seller
Watermarking Protocol without Trusted Third Party.
In Zhou, J., Yung, M., and Han, Y., editors, Applied
Cryptography and Network Security - ACNS 2003,
volume 2846 of Lecture Notes in Computer Science,
pages 265–279. Springer-Verlag.
Dent, A. and Mitchell, C. (2004). User’s Guide to Cryptog-
raphy and Standards. Artech House.
Dierks, T. and Rescorla, E. (2006). The TLS Protocol Ver-
sion 1.1. RFC 4346.
Fiat, A. and Shamir, A. (1987). How to prove your-
self: Practical solutions to identification and signature
problems. In Odlyzko, A. M., editor, Advances in
Cryptology - CRYPTO 1986, volume 263 of Lecture
Notes in Computer Science, pages 186–194. Springer-
Verlag.
Goi, B.-M., Phan, R. C.-W., Yang, Y., Bao, F., Deng,
R. H., and Siddiqi, M. U. (2004). Cryptanalysis of
Two Anonymous Buyer-Seller Watermarking Proto-
cols and an Improvement for True Anonymity. In
Jakobsson, M., Yung, M., and Zhou, J., editors, Ap-
plied Cryptography and Network Security - ACNS
2004, volume 3089 of Lecture Notes in Computer Sci-
ence, pages 369–382. Springer-Verlag.
Ibrahim, I. M., El-Din, S. H. N., and Hegazy, A. F. A.
(2007a). An Effective and Secure Buyer-Seller Wa-
termarking Protocol. In Third International Sympo-
sium on Information Assurance and Security (IAS 07),
IEEE Computer Society Press, pages 21–26.
Ibrahim, I. M., El-Din, S. H. N., and Hegazy, A. F. A.
(2007b). An Effective and Secure Watermarking Pro-
tocol for Digital Rights Protection Over the Second-
Hand Market. In SECRYPT 2007 - International Con-
ference on Security and Cryptography, pages 263–
268.
ISO (1998). Information Technology - Security Tech-
niques - Entity Authentication Mechanisms - Part 3:
Entity Authentication Using a Public Key Algorithm
ISO/IEC 9798-3. ISO/IEC International Standard,
2nd Edition.
Ju, H. S., Kim, H. J., Lee, D. H., and Lim, J. I. (2002).
An Anonymous Buyer-Seller Watermarking Protocol
with Anonymity Control. In Lee, P. J. and Lim, C. H.,
editors, Information Security and Cryptology - ICISC
2002, volume 2587 of Lecture Notes in Computer Sci-
ence, pages 421–432. Springer-Verlag.
Lei, C.-L., Yu, P.-L., Tsai, P.-L., and Chan, M.-H. (2004).
An Efficient and Anonymous Buyer-Seller Water-
marking Protocol. IEEE Trans. on Image Processing,
13(12):1618–1626.
Memon, N. and Wong, P. W. (2001). A Buyer-Seller Water-
marking Protocol. IEEE Trans. on Image Processing,
10(4):643–649.
Paillier, P. (1999). Public-key Cryptosystems Based on
Composite Degree Residuosity Classes. In Stern, J.,
editor, Advances in Cryptology - EUROCRYPT 1999,
volume 1592 of Lecture Notes in Computer Science,
pages 223–238. Springer-Verlag.
Pfitzmann, B. and Schunter, M. (1996). Asymmetric Fin-
gerprinting. In Maurer, U. M., editor, Advances in
Cryptology - EUROCRYPT 1996, volume 1070 of
Lecture Notes in Computer Science, pages 84–95.
Springer-Verlag.
Pfitzmann, B. and Waidner, M. (1997). Anonymous Finger-
printing. In Fumy, W., editor, Advances in Cryptology
- EUROCRYPT 1997, volume 1233 of Lecture Notes
in Computer Science, pages 88–102. Springer-Verlag.
Rivest, R. L., Shamir, A., and Adleman, L. (1978). A
Method for Obtaining Digital Signatures and Public-
Key Cryptosystems. Commun. of the ACM, 2(2):120–
126.
Wagner, N. R. (1983). Fingerprinting. In IEEE Symposium
on Security and Privacy, pages 18–22.
SECRYPT 2008 - International Conference on Security and Cryptography
260