Cryptanalysis of two anonymous buyer-seller watermarking protocols and an improvement for true anonymity

Bok Min Goi, Raphael C.W. Phan, Yanjiang Yang, Feng Bao, Robert H. Deng, M. U. Siddiqi

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

34 Citations (Scopus)

Abstract

By combining techniques of watermarking and fingerprinting, a sound buyer-seller watermarking protocol can address the issue of copyright protection in e-commerce. In this paper, we analyze the security of two recent anonymous buyer-seller watermarking protocols proposed by Ju et. al and Choi et. al respectively, and prove that they do not provide the features and security as claimed. In particular, we show that i) the commutative cryptosystem used in Choi et. al's protocol fails to prevent the watermark certification authority (WCA) from discovering the watermark (fingerprint) chosen by the buyer; ii) for both protocols, the seller can discover the watermark chosen by the buyer if he colludes with the WCA. Hence, these protocols cannot guard against conspiracy attacks. We further show that these protocols only provide "partial" anonymity, ie. the buyer's anonymity is guaranteed only if WCA is honest. Our results suggest that the security of these protocols must assume the honesty of WCA, contrary to the designers' original claim. Finally, we propose a new anonymous buyer-seller watermarking protocol which is more secure and efficient, and provides true anonymity.

Original languageEnglish
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
EditorsMarkus Jakobsson, Moti Yung, Jianying Zhou
PublisherSpringer
Pages369-382
Number of pages14
ISBN (Print)3540222170, 9783540222170
DOIs
Publication statusPublished - 2004
Externally publishedYes
EventInternational Conference on Applied Cryptography and Network Security 2004 - Yellow Mountain, China
Duration: 8 Jun 200411 Jun 2004
Conference number: 2nd
https://link.springer.com/book/10.1007/b98360 (Proceedings)

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3089
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

ConferenceInternational Conference on Applied Cryptography and Network Security 2004
Abbreviated titleACNS 2004
Country/TerritoryChina
CityYellow Mountain
Period8/06/0411/06/04
Internet address

Keywords

  • Anonymity
  • Copyright Protection
  • Fingerprinting
  • Traitor Tracing
  • Watermarking

Cite this