ON THE IMPORTANCE OF ONE-TIME KEY PAIRS IN BUYER-SELLER WATERMARKING PROTOCOLS
David M. Williams, Helen Treharnea, Anthony T. S. Ho
2010
Abstract
In this paper we emphasize the importance of unique certified one-time key pairs in Buyer-Seller Watermarking (BSW) protocols. We distinguish between reactive unbinding attacks, in which the seller reacts to illicit file sharing by fabricating further evidence of such activity, and pre-emptive unbinding attacks, in which the seller gains an advantage by taking action that pre-empts the file being shared. We demonstrate the importance of certified one-time key pairs in the BSWprotocol by Lei et al., for protecting against pre-emptive unbinding attacks, and subsequently reveal a new attack on a recently published BSW protocol due to its omission of unique key pairs.
References
- Barni, M. and Bartolini, F. (2004). Watermarking Systems Engineering. Marcel Dekker, Inc.
- Deng, M. and Preneel, B. (2008). Attacks on two buyerseller watermarking protocols and an improvement for revocable anonymity. Electronic Commerce and Security, International Symposium, 0:923-929.
- Hu, Y. and Zhang, J. (2009). A secure and efficient buyerseller watermarking protocol. Journal of Multimedia, 4(3):161-168.
- Ibrahim, I. M., El-Din, S. H. N., and Hegazy, A. F. A. (2007). An effective and secure buyer seller watermarking protocol. In Third International Symposium on Information Assurance and Security, pages 21-28.
- Ju, H. S., Kim, H. J., Lee, D. H., and Lim, J. I. (2003). An anonymous buyer-seller watermarking protocol with anonymity control. In International Conference on Information Security and Cryptology, pages 421-432.
- Lei, C. L., Yu, P. L., Tsai, P. L., and Chan, M. H. (2004). An efficient and anonymous buyer-seller watermarking protocol. IEEE Transactions on Image Processing, 13(12):1618-1626.
- Mauw, S. and Bos, V. (2001). Drawing Message Sequence Charts with LATEX. TUGBoat, 22(1-2):87-92.
- Memon, N. and Wong, P. W. (2001). A buyer seller watermarking protocol. IEEE Transactions on Image Processing, 10(4):643-649.
- Poh, G. S. and Martin, K. M. (2007). A framework for design and analysis of asymmetric fingerprinting protocols. In Third International Symposium on Information Assurance and Security, pages 457-461.
- Poh, G. S. and Martin, K. M. (2008). On the (in)security of two buyer-seller watermarking protocols. In SECRYPT 2008 - International Conference on Security and Cryptography, pages 253-260.
- Qiao, L. and Nahrstedt, K. (1998). Watermarking schemes and protocols for protecting rightful ownership and customer's rights. Journal of Visual Communication and Image Representation, 9(3):194-210.
- Shao, M. H. (2007). A privacy-preserving buyer-seller watermarking protocol with semi-trust third party. In Trust, Privacy and Security in Digital Business, pages 44-53.
- Williams, D. M., Treharne, H., Ho, A. T. S., and Culnane, C. (2008a). Using a formal analysis technique to identify an unbinding attack on a buyer-seller watermarking protocol. In 10th ACM Workshop on Multimedia and Security, pages 205-214.
- Williams, D. M., Treharne, H., Ho, A. T. S., and Waller, A. (2008b). Formal analysis of two buyer-seller watermarking protocols. In 7th International Workshop on Digital Watermarking, pages 278-292.
Paper Citation
in Harvard Style
M. Williams D., Treharnea H. and T. S. Ho A. (2010). ON THE IMPORTANCE OF ONE-TIME KEY PAIRS IN BUYER-SELLER WATERMARKING PROTOCOLS . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2010) ISBN 978-989-8425-18-8, pages 441-446. DOI: 10.5220/0002978704410446
in Bibtex Style
@conference{secrypt10,
author={David M. Williams and Helen Treharnea and Anthony T. S. Ho},
title={ON THE IMPORTANCE OF ONE-TIME KEY PAIRS IN BUYER-SELLER WATERMARKING PROTOCOLS},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2010)},
year={2010},
pages={441-446},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002978704410446},
isbn={978-989-8425-18-8},
}
in EndNote Style
TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2010)
TI - ON THE IMPORTANCE OF ONE-TIME KEY PAIRS IN BUYER-SELLER WATERMARKING PROTOCOLS
SN - 978-989-8425-18-8
AU - M. Williams D.
AU - Treharnea H.
AU - T. S. Ho A.
PY - 2010
SP - 441
EP - 446
DO - 10.5220/0002978704410446