2010
DOI: 10.1109/tifs.2010.2072830
|View full text |Cite
|
Sign up to set email alerts
|

A Provably Secure Anonymous Buyer–Seller Watermarking Protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
51
0

Year Published

2012
2012
2019
2019

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 55 publications
(52 citation statements)
references
References 25 publications
1
51
0
Order By: Relevance
“…Thus, using a trusted third party is a price worth paying if it can turn a fingerprinting scheme into a practical alternative (Martínez-Ballesté, Sebé, Domingo-Ferrer, & Soriano, 2003). A buyer-seller watermarking scheme (Phan, Goi, Poh, & Jongsung, 2011;Rial, Deng, Bianchi, Piva, & Preneel, 2010) incorporates both watermarking and fingerprinting mechanisms to protect the rights of both the content provider (merchant) and the customer (buyer). A complete and sound buyer-seller watermarking protocol is expected to solve the following requirements (Deng & Preneel, 2008):…”
Section: Buyer-seller Watermarking Protocolsmentioning
confidence: 99%
“…Thus, using a trusted third party is a price worth paying if it can turn a fingerprinting scheme into a practical alternative (Martínez-Ballesté, Sebé, Domingo-Ferrer, & Soriano, 2003). A buyer-seller watermarking scheme (Phan, Goi, Poh, & Jongsung, 2011;Rial, Deng, Bianchi, Piva, & Preneel, 2010) incorporates both watermarking and fingerprinting mechanisms to protect the rights of both the content provider (merchant) and the customer (buyer). A complete and sound buyer-seller watermarking protocol is expected to solve the following requirements (Deng & Preneel, 2008):…”
Section: Buyer-seller Watermarking Protocolsmentioning
confidence: 99%
“…To do so, he sends to the TTP into an encrypted form: his identifier and those of P and Y , along with their digital signature: PE pK TTP m y , DS R m y (12) where…”
Section: "Opinion Response" Sub-protocolmentioning
confidence: 99%
“…It is almost the same for the response of the expert. We retrieve an issue of traitor tracing, as in VOD scenario, similar to which an appropriate solution consists in using homomorphic encryption [10][11][12]. In that case, our protocol remains the same.…”
Section: Traceability Issuementioning
confidence: 99%
See 1 more Smart Citation
“…The main aim is to achieve a high level of efficiency in applying the watermark protection, since the adopted enciphering scheme only involves computations of modular additions, whereas the other schemes based on homomorphic encryption require computations of modular exponentiations, which are much more expensive than modular additions. The protocol described in [9] is mainly based on two security primitives: group signatures and homomorphic encryption. The former primitive allows buyers to sign the purchase messages they send to the seller on behalf of the group of buyers.…”
Section: Introductionmentioning
confidence: 99%