Cryptanalysis of a generalized anonymous buyer-seller watermarking protocol of IWDW 2004
In this paper, we analyze the security of a generalized anonymous buyer-seller watermarking protocol recently proposed by Choi and Park at IWDW 2004. We prove that it has not met the designers' intended security criteria by showing that an attacker can actually: (1) discover the unique buyer...
| Main Authors: | , , |
|---|---|
| Format: | Article |
| Published: |
2005
|
| Subjects: | |
| Online Access: | http://shdl.mmu.edu.my/2270/ |
| _version_ | 1848790010728284160 |
|---|---|
| author | Goi, , BM Phan, , RCW Siddiqi,, MU |
| author_facet | Goi, , BM Phan, , RCW Siddiqi,, MU |
| author_sort | Goi, , BM |
| building | MMU Institutional Repository |
| collection | Online Access |
| description | In this paper, we analyze the security of a generalized anonymous buyer-seller watermarking protocol recently proposed by Choi and Park at IWDW 2004. We prove that it has not met the designers' intended security criteria by showing that an attacker can actually: (1) discover the unique buyer's watermark which was chosen by the watermark certificate center (WCC), and (2) decrypt the encrypted watermarked digital content without any extra cost. Also, it is surprising to note that when designing their protocol, the designers did not take into consideration the conspiracy attacks. |
| first_indexed | 2025-11-14T18:05:49Z |
| format | Article |
| id | mmu-2270 |
| institution | Multimedia University |
| institution_category | Local University |
| last_indexed | 2025-11-14T18:05:49Z |
| publishDate | 2005 |
| recordtype | eprints |
| repository_type | Digital Repository |
| spelling | mmu-22702011-09-09T07:49:06Z http://shdl.mmu.edu.my/2270/ Cryptanalysis of a generalized anonymous buyer-seller watermarking protocol of IWDW 2004 Goi, , BM Phan, , RCW Siddiqi,, MU QA75.5-76.95 Electronic computers. Computer science In this paper, we analyze the security of a generalized anonymous buyer-seller watermarking protocol recently proposed by Choi and Park at IWDW 2004. We prove that it has not met the designers' intended security criteria by showing that an attacker can actually: (1) discover the unique buyer's watermark which was chosen by the watermark certificate center (WCC), and (2) decrypt the encrypted watermarked digital content without any extra cost. Also, it is surprising to note that when designing their protocol, the designers did not take into consideration the conspiracy attacks. 2005 Article NonPeerReviewed Goi, , BM and Phan, , RCW and Siddiqi,, MU (2005) Cryptanalysis of a generalized anonymous buyer-seller watermarking protocol of IWDW 2004. EMBEDDED AND UBIQUITOUS COMPUTING - EUC 2005 WORKSHOPS, PROCEEDINGS, 3823 . pp. 936-944. ISSN 0302-9743 |
| spellingShingle | QA75.5-76.95 Electronic computers. Computer science Goi, , BM Phan, , RCW Siddiqi,, MU Cryptanalysis of a generalized anonymous buyer-seller watermarking protocol of IWDW 2004 |
| title | Cryptanalysis of a generalized anonymous buyer-seller watermarking protocol of IWDW 2004 |
| title_full | Cryptanalysis of a generalized anonymous buyer-seller watermarking protocol of IWDW 2004 |
| title_fullStr | Cryptanalysis of a generalized anonymous buyer-seller watermarking protocol of IWDW 2004 |
| title_full_unstemmed | Cryptanalysis of a generalized anonymous buyer-seller watermarking protocol of IWDW 2004 |
| title_short | Cryptanalysis of a generalized anonymous buyer-seller watermarking protocol of IWDW 2004 |
| title_sort | cryptanalysis of a generalized anonymous buyer-seller watermarking protocol of iwdw 2004 |
| topic | QA75.5-76.95 Electronic computers. Computer science |
| url | http://shdl.mmu.edu.my/2270/ |