ics in Cryptology - CT-RSA 2005,
LNCS 3376, pages
136–153. Springer-Verlag.
Benaloh, J. (1994). Dense probabilistic encryption. In Proc.
Selected Areas of Cryptography (SAC’94), pages 120–
128.
Biehl, I. and Meyer, B. (1997). Protocols for collusion-
secure asymmetric fingerprinting. In Proc. 14th
STACS, LNCS 1200, pages 213–222. Springer-Verlag.
Blakley, G. R., Meadows, C., and Prudy, G. B. (1985). Fin-
gerprinting long forgiving messages. In Advances in
Cryptology - CRYPTO 85, LNCS 218, pages 180–189.
Springer-Verlag.
Boneh, D. and Shaw, J. (1995). Collusion-secure finger-
printing for digital data. LNCS 963, pages 452–465.
Camenisch, J. (2000). Efficient anonymous fingerprinting
with group signatures. In ASIACRYPT, LNCS 1976,
pages 415–428. Springer-Verlag.
Camenisch, J. and Damg˚ard, I. (1998). Verifiable encryp-
tion and applications to group signatures and signature
sharing. In Technical Report RS-98-32, BRICS, De-
partment of Computer Science, University of Aarhus.
Cox, I., Kilian, J., Leighton, T., and Shamoon, T. (1997).
Secure spread spectrum watermarking for multimedia.
IEEE Transactions on Image Processing, 6(12):1673–
1687.
Frattolillo, F. (2007). Watermarking protocol for web con-
text. IEEE Transactions on Information Forensics and
Security, 2(3):350–363.
Goi, B.-M., Phan, R. C.-W., Yang, Y., Bao, F., Deng, R. H.,
and Siddiqi, M. U. (2004). Cryptanalysis of two
anonymous buyer-seller watermarking protocols and
an improvement for true anonymity. In Applied Cryp-
tography and Network Security, LNCS 2587, pages
369–382.
Goldwasser, S. and Micali, S. (1982). Probabilistic encryp-
tion and how to play mental poker hiding all partial
information. In Proceedings of the 14th Annual ACM
Symposium on the Theory of Computing, pages 365–
377.
Ibrahim, I. M., El-Din, S. H. N., and Hegazy, A. F. A.
(2007). An effective and secure buyer-seller wa-
termarking protocol. In Third International Sympo-
sium onInformation Assurance and Security, 2007.
IAS 2007, pages 21–28.
Jae-Gwi Choi, Kouichi Sakurai, J.-H. P. (2003). Does it
need trusted third party? design of buyer-seller wa-
termarking protocol without trusted third party. In
Applied Cryptography and Network Security, LNCS
2846, pages 265–279.
Ju, H.-S., Kim, H.-J., Lee, D.-H., and Lim, J.-I. (2002). An
anonymous buyer-seller watermarking protocol with
anonymity control. Information Security and Cryptol-
ogy - ICISC, pages 421–432.
Jurik, I. D. M. (2001). A generalisation, a simplification and
some applications of paillier’s probabilistic public-key
system. In 4th International Workshop on Practice
and Theory in Public-Key Cryptography, LNCS 1992,
pages 119–136. Springer-Verlag.
Kuribayashi, M. and Tanaka, H. (2005). Fingerprinting
protocol for images based on additive homomorphic
property. IEEE Transactions on Image Processing,
14(12):2129–2139.
Lei, C.-L., Yu, P.-L., Tsai, P.-L., and Chan, M.-H. (2004).
An efficient and anonymous buyer-seller watermark-
ing protocol. IEEE Transactions on Image Process-
ing, 13(12):1618–1626.
Liu, K., Trappe, W., Wang, Z., Wu, M., and Zhao, H.
(2005). Multimedia Fingerprinting Forensics for
Traitor Tracing. EURASIP Book Series on Signal
Processing and Communications. Hindawi Publishing
Co.
Memon, N. D. and Wong, P. W. (2001). A buyer-seller
watermarking protocol. IEEE Transactions on Image
Processing, 10(4):643–649.
Naccache, D. and Stern, J. (1998). A new public-key cryp-
tosystem based on higher residues. In 5th ACM Con-
ference on Computer and Communications Security,
pages 59–66. ACM.
Okamoto, T. and Uchiyama, S. (1998). A new public-
key cryptosystem as secure as factoring. In Advances
in Cryptology - EUROCRYPT’98, LNCS 1403, pages
308–318. Springer-Verlag.
Paillier, P. (1999). Public-key cryptosystems based on
composite degree residuosity classes. In Advances
in Cryptology - EUROCRYPT’99, LNCS 1592, pages
223–238. Springer-Verlag.
Pfitzmann, B. and Sadeghi, A.-R. (1999). Coin-based
anonymous fingerprinting. In Advances in Cryptol-
ogy - EUROCRYPT’99, LNCS 1592, pages 150–164.
Springer-Verlag.
Pfitzmann, B. and Sadeghi, A.-R. (2000). Anonymous fin-
gerprinting with direct non-repudiation. In Advances
in Cryptology - ASIACRYPT ’00, LNCS 1976, pages
401–414. Springer-Verlag.
Pfitzmann, B. and Waidner, M. (1997). Anonymous fin-
gerprinting. In Advances in Cryptology - EURO-
CRYPT’97, pages 88–102.
Pittzmann, B. and Schunter, M. (1996). Asymmetric
fngerprinting. In Advances in Cryptology - EU-
ROCRYPT’96, LNCS 1070, pages 84–95. Springer-
Verlag.
Qiao, L. and Nahrstedt, K. (1998). Watermarking schemes
and protocols for protecting rightful ownership and
customer’s rights. Journal of Visual Communication
and Image Representation, 9(3):194 – 210.
Trappe, W., Wu, M., Wang, Z. J., and Liu, K. J. R. (2003).
Anti-collusion forensics of multimedia fingerprinting
using orthogonal modulation. IEEE Transactions on
Image Processing, 51(4):1069 – 1087.
Wang, Z. J., Wu, M., Zhao, H. V., Trappe, W., and Liu,
K. J. R. (2005). Anti-collusion forensics of multime-
dia fingerprinting using orthogonal modulation. IEEE
Transactions on Image Processing, 14(6):804 – 821.
Zhang, J., Kou, W., and Fan, K. (2006). Secure buyer-seller
watermarking protocol. In IEE Proceedings Informa-
tion Security, volume 153, pages 15–18.
ANONYMOUS BUYER-SELLER WATERMARKING PROTOCOL WITH ADDITIVE HOMOMORPHISM
307