toni et al., 2007), and techniques for the optimistic
fair exchange of those items are yet to be seen.
Our reversible degradation model, presented in Sec-
tion 3, shall produce the first solutions to address
the exchange of indescribable items optimistically.
Other alternative models for multimedia purchase,
presented in Section 4, do not seem to address our
concerns as well as our reversible degradation model
in conjunction to fair exchange protocols.
The focus of our current work remains on evaluat-
ing several promising techniques, as well as propos-
ing new ones, for reversible degradation of multime-
dia items. Concurrently, we are also giving the first
steps towards the formalization of the item validation
problem of fair exchange protocols, which remains an
important open problem of cryptographic protocols
design. We believe that, unless some attention is ded-
icated to the item validation problem and to how to
accurately describe digital items, fairness will remain
left aside from e-commerce and, as a consequence,
reliance on e-commerce will never be as high as it
should be in today’s market needs.
REFERENCES
Asokan, N. (1998). Fairness in electronic commerce. Re-
search Report RZ3027.
Bottoni, A., Dini, G., and Stabell-Kulø, T. (2007). A
methodology for verification of digital items in fair ex-
change protocols with active trustee. Electronic Com-
merce Research, 7(2).
Cheng, H. and Li, X. (2000). Partial encryption of com-
pressed images and videos. Signal Processing, IEEE
Transactions on, 48(8):2439–2451.
Gartner, F. C., Pagnia, H., and Vogt, H. (1999). Approach-
ing a FormalDefinition of Fairness in Electronic Com-
merce. SRDS.
Kremer, S., Markowitch, O., and Zhou, J. (2002). An inten-
sive survey of fair non-repudiation protocols. Com-
puter Communications, 25(17):1606–1621.
Kwong, S. (2006). An algorithm for removable visible wa-
termarking. IEEE Transactions on Circuits and Sys-
tems for Video Technology, 16(1):129–133.
Lacoste, G., Pfitzmann, B., Steiner, M., and Waidner, M.
(2000). SEMPER - Secure Electronic Marketplace for
Europe. Lecture Notes in Computer Science (LNCS),
1854.
Lian, S. (2009). Multimedia Content Encryption: Tech-
niques and Applications.
Loytynoja, M., Cvejic, N., and Seppanen, T. (2007). Audio
protection with removable watermarking. In 2007 6th
International Conference on Information, Communi-
cations & Signal Processing, pages 1–4. IEEE.
Markowitch, O. and Roggeman, Y. (1999). Probabilis-
tic Non-Repudiation without Trusted Third Party. In
Second Workshop on Security in Communication Net-
work˜99.
Minder, L. (2007). Cryptography based on error correcting
codes. algo.epfl.ch.
Nenadic, A., Zhang, N., and Barton, S. (2004). FIDES -
a Middleware ECommerce Security Solution. In The
3rd European Conference on Information Warfare and
Security (ECIW, pages 295–304.
Piva, F. R. (2009). Verificac¸˜ao formal de protocolos de
trocas justas utilizando o m´etodo de espac¸os de fitas.
Master’s thesis, UNICAMP.
Piva, F. R., Monteiro, J. R. M., and Dahab, R. (2007).
Strand spaces and fair exchange: More on how to trace
attacks and security problems. In Anais do VII SBSeg,
Simp´osio Brasileiro em Seguranc¸a da Informac¸ ˜ao e de
Sistemas Computacionais.
Piva, F. R., Monteiro, J. R. M., and Dahab, R. (2009). Re-
garding timeliness in the context of fair exchange. In
Network and Service Security, 2009. N2S ’09. Inter-
national Conference on, pages 1–6.
Piva, F. R., Monteiro, J. R. M., Devegili, A. J., and Dahab,
R. (2006). Applying Strand Spaces to Certified Deliv-
ery Proofs. In Anais do VI SBSeg, Simp´osio Brasileiro
em Seguranc¸a da Informac¸˜ao e de Sistemas Computa-
cionais.
Servetti, A., Testa, C., and Martin, J. D. (2003). Frequency-
selective partial encryption of compressed audio.
IEEE International Conference on Aucoustics.
Thayer, F. J., Herzog, J. C., and Guttman, J. D. (1999).
Strand Spaces: Proving Security Protocols Correct.
Journal of Computer Security, 7(2–3):191–230.
Valimaki, M. and Oksanen, V. (2006). DRM interoperabil-
ity and intellectual property policy in europe.
Vogt, H. (2003). Asynchronous optimistic fair exchange
based on revocable items. In Financial Cryptography,
pages 208–222.
SECRYPT 2011 - International Conference on Security and Cryptography
324