ON THE (IN)SECURITY OF TWO BUYER-SELLER WATERMARKING PROTOCOLS

Geong Sen Poh, Keith M. Martin

2008

Abstract

A buyer-seller watermarking protocol deters dishonest buyers from illegally distributing bought content. This is achieved by giving the seller the capability to trace and identify these buyers, while also allowing the seller to prove illegal acts to a third party. At the same time, an honest buyer is prevented from being falsely accused of illegal content distribution by the seller. Many protocols have been proposed, with two recent proposals being the protocols proposed by Ibrahim et al. in IAS 2007 and SECRYPT 2007. We will show that these protocols are not secure, especially for the seller. We further put forward our thoughts on how it is possible to avoid the security weaknesses found in them.

Download


Paper Citation


in Harvard Style

Sen Poh G. and M. Martin K. (2008). ON THE (IN)SECURITY OF TWO BUYER-SELLER WATERMARKING PROTOCOLS . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2008) ISBN 978-989-8111-59-3, pages 253-260. DOI: 10.5220/0001919702530260

in Bibtex Style

@conference{secrypt08,
author={Geong Sen Poh and Keith M. Martin},
title={ON THE (IN)SECURITY OF TWO BUYER-SELLER WATERMARKING PROTOCOLS},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2008)},
year={2008},
pages={253-260},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0001919702530260},
isbn={978-989-8111-59-3},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2008)
TI - ON THE (IN)SECURITY OF TWO BUYER-SELLER WATERMARKING PROTOCOLS
SN - 978-989-8111-59-3
AU - Sen Poh G.
AU - M. Martin K.
PY - 2008
SP - 253
EP - 260
DO - 10.5220/0001919702530260