A Generalization of an Anonymous Buyer-Seller Watermarking Protocol and Its Application to Mobile Communications

Buyer-seller watermarking schemes enable sellers to identify the buyer of illegally distributed contents by providing each buyer with a slightly different version. To protect the privacy of buyers, buyers' purchase should be done anonymously, and unlinkability of contents purchased should be satisfied. In this paper, our concern is to generalize a buyer-seller watermarking protocol to multi-purchase environments. The problem of most schemes in the literature is that the number of keys held by buyer's devices increases in proportion to that of contents purchased, if we apply it to multi-purchase case. Otherwise, they cannot provide unlinkability. We propose an efficient multi-purchase buyer-seller watermarking protocol satisfying anonymity and unlinkability, where a buyer executes registration step one time and the number of buyer's necessary key is also one regardless of that of contents. Our second concern is to extend this scheme to the mobile communications. Our scheme reduces amount of buyers' computations to the minimum by introducing a concept of mobile agents.

[1]  David Chaum,et al.  An Improved Protocol for Demonstrating Possession of Discrete Logarithms and Some Generalizations , 1987, EUROCRYPT.

[2]  Miguel Mira da Silva,et al.  Secure Mobile Agent Digital Signatures with Proxy Certificates , 2001, E-Commerce Agents.

[3]  David Chaum,et al.  Advances in Cryptology — EUROCRYPT’ 87 , 2000, Lecture Notes in Computer Science.

[4]  Ahmad-Reza Sadeghi,et al.  Coin-Based Anonymous Fingerprinting , 1999, EUROCRYPT.

[5]  Josep Domingo-Ferrer,et al.  Anonymous Fingerprinting Based on Committed Oblivious Transfer , 1999, Public Key Cryptography.

[6]  Nasir D. Memon,et al.  A buyer-seller watermarking protocol , 2001, IEEE Trans. Image Process..

[7]  Arto Salomaa,et al.  Public-Key Cryptography , 1991, EATCS Monographs on Theoretical Computer Science.

[8]  Toru Nakanishi,et al.  Unlinkable Electronic Coupon Protocol with Anonymity Control , 1999, ISW.

[9]  Birgit Pfitzmann,et al.  Anonymous Fingerprinting , 1997, EUROCRYPT.

[10]  Chae Hoon Lim,et al.  Information Security and Cryptology — ICISC 2002 , 2003, Lecture Notes in Computer Science.

[11]  Jacques Stern,et al.  Advances in Cryptology — EUROCRYPT ’99 , 1999, Lecture Notes in Computer Science.

[12]  Jiming Liu,et al.  E-Commerce Agents , 2001, Lecture Notes in Computer Science.

[13]  Dong Hoon Lee,et al.  An Anonymous Buyer-Seller Watermarking Protocol with Anonymity Control , 2002, ICISC.

[14]  Walter Fumy,et al.  Advances in Cryptology — EUROCRYPT ’97 , 2001, Lecture Notes in Computer Science.

[15]  Klara Nahrstedt,et al.  Watermarking Schemes and Protocols for Protecting Rightful Ownership and Customer's Rights , 1998, J. Vis. Commun. Image Represent..