Cryptanalysis of a generalized anonymous buyer-seller watermarking protocol of IWDW 2004

In this paper, we analyze the security of a generalized anonymous buyer-seller watermarking protocol recently proposed by Choi and Park at IWDW 2004. We prove that it has not met the designers' intended security criteria by showing that an attacker can actually: (1) discover the unique buyer�...

Full description

Bibliographic Details
Main Authors: Goi, , BM, Phan, , RCW, Siddiqi,, MU
Format: Article
Published: 2005
Subjects:
Online Access:http://shdl.mmu.edu.my/2270/
_version_ 1848790010728284160
author Goi, , BM
Phan, , RCW
Siddiqi,, MU
author_facet Goi, , BM
Phan, , RCW
Siddiqi,, MU
author_sort Goi, , BM
building MMU Institutional Repository
collection Online Access
description In this paper, we analyze the security of a generalized anonymous buyer-seller watermarking protocol recently proposed by Choi and Park at IWDW 2004. We prove that it has not met the designers' intended security criteria by showing that an attacker can actually: (1) discover the unique buyer's watermark which was chosen by the watermark certificate center (WCC), and (2) decrypt the encrypted watermarked digital content without any extra cost. Also, it is surprising to note that when designing their protocol, the designers did not take into consideration the conspiracy attacks.
first_indexed 2025-11-14T18:05:49Z
format Article
id mmu-2270
institution Multimedia University
institution_category Local University
last_indexed 2025-11-14T18:05:49Z
publishDate 2005
recordtype eprints
repository_type Digital Repository
spelling mmu-22702011-09-09T07:49:06Z http://shdl.mmu.edu.my/2270/ Cryptanalysis of a generalized anonymous buyer-seller watermarking protocol of IWDW 2004 Goi, , BM Phan, , RCW Siddiqi,, MU QA75.5-76.95 Electronic computers. Computer science In this paper, we analyze the security of a generalized anonymous buyer-seller watermarking protocol recently proposed by Choi and Park at IWDW 2004. We prove that it has not met the designers' intended security criteria by showing that an attacker can actually: (1) discover the unique buyer's watermark which was chosen by the watermark certificate center (WCC), and (2) decrypt the encrypted watermarked digital content without any extra cost. Also, it is surprising to note that when designing their protocol, the designers did not take into consideration the conspiracy attacks. 2005 Article NonPeerReviewed Goi, , BM and Phan, , RCW and Siddiqi,, MU (2005) Cryptanalysis of a generalized anonymous buyer-seller watermarking protocol of IWDW 2004. EMBEDDED AND UBIQUITOUS COMPUTING - EUC 2005 WORKSHOPS, PROCEEDINGS, 3823 . pp. 936-944. ISSN 0302-9743
spellingShingle QA75.5-76.95 Electronic computers. Computer science
Goi, , BM
Phan, , RCW
Siddiqi,, MU
Cryptanalysis of a generalized anonymous buyer-seller watermarking protocol of IWDW 2004
title Cryptanalysis of a generalized anonymous buyer-seller watermarking protocol of IWDW 2004
title_full Cryptanalysis of a generalized anonymous buyer-seller watermarking protocol of IWDW 2004
title_fullStr Cryptanalysis of a generalized anonymous buyer-seller watermarking protocol of IWDW 2004
title_full_unstemmed Cryptanalysis of a generalized anonymous buyer-seller watermarking protocol of IWDW 2004
title_short Cryptanalysis of a generalized anonymous buyer-seller watermarking protocol of IWDW 2004
title_sort cryptanalysis of a generalized anonymous buyer-seller watermarking protocol of iwdw 2004
topic QA75.5-76.95 Electronic computers. Computer science
url http://shdl.mmu.edu.my/2270/