A Privacy-Preserving Buyer-Seller Watermarking Protocol Based on Priced Oblivious Transfer

نویسندگان

  • Alfredo Rial
  • Josep Balasch
  • Bart Preneel
چکیده

Buyer-seller watermarking protocols allow copyright protection of digital goods. To protect privacy, some of those protocols provide buyers with anonymity. However, anonymous e-commerce protocols pose several disadvantages, like hindering customer management or requiring anonymous payment mechanisms. Additionally, no existing buyer-seller watermarking protocol provides fair exchange. We propose a novel approach for the design of privacypreserving buyer-seller watermarking protocols. In our approach, the seller authenticates buyers but does not learn which items are purchased. Since buyers are not anonymous, customer management is eased and currently deployed methods of payment can be utilized. We define an ideal functionality for privacy-preserving copyright protection protocols. To realize our functionality, a protocol must ensure that buyers pay the right price without disclosing the purchased item, and that sellers are able to identify buyers that released pirated copies. We construct a protocol based on priced oblivious transfer and on existing techniques for asymmetric watermark embedding. Furthermore, we implement and evaluate the efficiency of our protocol, and we explain how to extend it in order to achieve optimistic fair exchange.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Lightweight Privacy Preserved Buyer Seller Watermarking Protocol Based on Priced Oblivious Transfer

Advent of Internet has resulted in e-commerce replacing traditional selling of digital products (such as songs, videos,movies, software, books, documents, images, etc.) through shops. This mode of sale can bring the product price down as infrastructure cost in setting up shops and retail chain is reduced. On downside, however, this may increase problem of piracy as digital data can be easily co...

متن کامل

Optimistic Fair Priced Oblivious Transfer

Priced oblivious transfer (POT) is a two-party protocol between a vendor and a buyer in which the buyer purchases digital goods without the vendor learning what is bought. Although privacy properties are guaranteed, current schemes do not offer fair exchange. A malicious vendor can, e.g., prevent the buyer from retrieving the goods after receiving the payment, and a malicious buyer can also acc...

متن کامل

Comments on a Buyer-Seller Watermarking Protocol for Large Scale Networks

Buyer-seller watermarking are protocols guaranteeing the buyer prevents false infringement accusations and the seller protects the watermark secrets from the buyer. Most recently, Chang et al. proposed an efficient and fair buyer-seller watermarking scheme for large scale networks quite recently. In this correspondence, we first shows its three weaknesses: the buyer can easily remove the waterm...

متن کامل

Anonymous Buyer-Seller Watermarking Protocol wth Additive Homomorphism

Buyer-seller watermarking protocols integrate multimedia watermarking and fingerprinting with cryptography, for copyright protection, piracy tracing, and privacy protection. We propose an efficient buyer-seller watermarking protocol based on dynamic group signatures and additive homomorphism, to provide all the required security properties, namely traceability, anonymity, unlinkability, dispute...

متن کامل

A Verifiable and Secret Buyer-seller Watermarking Protocol

A trusted third party (TTP) is introduced to the buyer-seller protocol to guarantee the transaction fairness in protocol. However, the TTP practically increases the cost in the buyer-seller protocol. To address this issue, we propose a novel buyer–seller watermarking protocol to eliminate the need for a TTP. By dividing the buyer’s secret key into two primary mechanisms: the buyer’s watermark, ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IEEE Trans. Information Forensics and Security

دوره 6  شماره 

صفحات  -

تاریخ انتشار 2011