ON THE (IN)SECURITY OF TWO BUYER-SELLER WATERMARKING PROTOCOLS
Geong Sen Poh, Keith M. Martin
2008
Abstract
A buyer-seller watermarking protocol deters dishonest buyers from illegally distributing bought content. This is achieved by giving the seller the capability to trace and identify these buyers, while also allowing the seller to prove illegal acts to a third party. At the same time, an honest buyer is prevented from being falsely accused of illegal content distribution by the seller. Many protocols have been proposed, with two recent proposals being the protocols proposed by Ibrahim et al. in IAS 2007 and SECRYPT 2007. We will show that these protocols are not secure, especially for the seller. We further put forward our thoughts on how it is possible to avoid the security weaknesses found in them.
DownloadPaper Citation
in Harvard Style
Sen Poh G. and M. Martin K. (2008). ON THE (IN)SECURITY OF TWO BUYER-SELLER WATERMARKING PROTOCOLS . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2008) ISBN 978-989-8111-59-3, pages 253-260. DOI: 10.5220/0001919702530260
in Bibtex Style
@conference{secrypt08,
author={Geong Sen Poh and Keith M. Martin},
title={ON THE (IN)SECURITY OF TWO BUYER-SELLER WATERMARKING PROTOCOLS},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2008)},
year={2008},
pages={253-260},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0001919702530260},
isbn={978-989-8111-59-3},
}
in EndNote Style
TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2008)
TI - ON THE (IN)SECURITY OF TWO BUYER-SELLER WATERMARKING PROTOCOLS
SN - 978-989-8111-59-3
AU - Sen Poh G.
AU - M. Martin K.
PY - 2008
SP - 253
EP - 260
DO - 10.5220/0001919702530260