A Provably Secure Anonymous Buyer-Seller

Buyer-seller watermarking (BSW) protocols allow copyright protection of digital content. The protocol is anonymous when the identity of buyers is not revealed if they do not release pirated copies. Existing BSW protocols are not provided with a formal analysis of their security properties. We employ the ideal-world/real-world paradigm to propose a formal security definition for copyright protection protocols, and we analyze an anonymous BSW protocol and prove that it fulfills our defini- tion. Additionally, we implement the protocol and measure its efficiency. Index Terms—Buyer-seller watermarking (BSW) protocol, ideal-world/real-world paradigm.

[1]  Jan Camenisch Efficient Anonymous Fingerprinting with Group Signatures , 2000, ASIACRYPT.

[2]  K. J. Ray Liu,et al.  Multimedia Fingerprinting Forensics for Traitor Tracing , 2005 .

[3]  Jan Camenisch,et al.  Practical Verifiable Encryption and Decryption of Discrete Logarithms , 2003, CRYPTO.

[4]  Ahmad-Reza Sadeghi,et al.  Proving Ownership of Digital Content , 1999, Information Hiding.

[5]  Birgit Pfitzmann,et al.  Anonymous Fingerprinting , 1997, EUROCRYPT.

[6]  Steve Kremer,et al.  Formal analysis of optimistic fair exchange protocols , 2004 .

[7]  Bernd Meyer,et al.  Protocols for Collusion-Secure Asymmetric Fingerprinting (Extended Abstract) , 1997, STACS.

[8]  Jacques Stern,et al.  Fair Encryption of RSA Keys , 2000, EUROCRYPT.

[9]  Mihir Bellare,et al.  On Defining Proofs of Knowledge , 1992, CRYPTO.

[10]  Ran Canetti,et al.  Universally composable security: a new paradigm for cryptographic protocols , 2001, Proceedings 2001 IEEE International Conference on Cluster Computing.

[11]  Stefan Katzenbeisser,et al.  A Buyer–Seller Watermarking Protocol Based on Secure Embedding , 2008, IEEE Transactions on Information Forensics and Security.

[12]  Dong Hoon Lee,et al.  An Anonymous Buyer-Seller Watermarking Protocol with Anonymity Control , 2002, ICISC.

[13]  Nasir D. Memon,et al.  A buyer-seller watermarking protocol , 2001, IEEE Trans. Image Process..

[14]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[15]  Jun Zhang,et al.  Secure buyer-seller watermarking protocol , 2006 .

[16]  Min Wu,et al.  Anti-collusion fingerprinting for multimedia , 2003, IEEE Trans. Signal Process..

[17]  Klara Nahrstedt,et al.  Watermarking Schemes and Protocols for Protecting Rightful Ownership and Customer's Rights , 1998, J. Vis. Commun. Image Represent..

[18]  Dan Boneh,et al.  Collusion-Secure Fingerprinting for Digital Data (Extended Abstract) , 1995, CRYPTO.

[19]  Lawrence O'Gorman,et al.  Electronic Marking and Identification Techniques to Discourage Document Copying , 1995, IEEE J. Sel. Areas Commun..

[20]  Birgit Pfitzmann,et al.  Asymmetric Fingerprinting (Extended Abstract) , 1996, EUROCRYPT.

[21]  Min Wu,et al.  Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation , 2005, IEEE Transactions on Image Processing.

[22]  Derrick Grover,et al.  The Protection of Computer Software: Its Technology and Application , 1992 .

[23]  Mihir Bellare,et al.  Foundations of Group Signatures: The Case of Dynamic Groups , 2005, CT-RSA.

[24]  Alessandro Piva,et al.  An efficient buyer-seller watermarking protocol based on composite signal representation , 2009, MM&Sec '09.

[25]  Ivan Damgård,et al.  A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System , 2001, Public Key Cryptography.

[26]  Ahmad-Reza Sadeghi,et al.  Anonymous Fingerprinting with Direct Non-repudiation , 2000, ASIACRYPT.

[27]  Catherine A. Meadows,et al.  Fingerprinting Long Forgiving Messages , 1985, CRYPTO.

[28]  Chin-Laung Lei,et al.  An efficient and anonymous buyer-seller watermarking protocol , 2004, IEEE Transactions on Image Processing.

[29]  David Chaum,et al.  Group Signatures , 1991, EUROCRYPT.