Fingerprinting long forgiving messages
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
Security Engineering: A Guide to Building Dependable Distributed Systems
Security Engineering: A Guide to Building Dependable Distributed Systems
Handbook of Applied Cryptography
Handbook of Applied Cryptography
An Efficient and Practical Scheme for Privacy Protection in the E-Commerce of Digital Goods
ICISC '00 Proceedings of the Third International Conference on Information Security and Cryptology
Collusion-Secure Fingerprinting for Digital Data (Extended Abstract)
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
A New Anonymous Fingerprinting Scheme with High Enciphering Rate
INDOCRYPT '01 Proceedings of the Second International Conference on Cryptology in India: Progress in Cryptology
Anonymous Fingerprinting Based on Committed Oblivious Transfer
PKC '99 Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography
A Commutative Encrypted Protocol for the Privacy Protection of Watermarks in Digital Contents
HICSS '04 Proceedings of the Proceedings of the 37th Annual Hawaii International Conference on System Sciences (HICSS'04) - Track 4 - Volume 4
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
EUROCRYPT'87 Proceedings of the 6th annual international conference on Theory and application of cryptographic techniques
An improved protocol for demonstrating possession of discrete logarithms and some generalizations
EUROCRYPT'87 Proceedings of the 6th annual international conference on Theory and application of cryptographic techniques
Coin-based anonymous fingerprinting
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
An anonymous buyer-seller watermarking protocol with anonymity control
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
Cryptanalysis of two non-anonymous buyer-seller watermarking protocols for content protection
ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part I
Cryptanalysis of two provably secure cross-realm C2C-PAKE protocols
INDOCRYPT'06 Proceedings of the 7th international conference on Cryptology in India
An efficient fingerprinting scheme with symmetric and commutative encryption
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
IH'04 Proceedings of the 6th international conference on Information Hiding
Cryptanalysis of a generalized anonymous buyer-seller watermarking protocol of IWDW 2004
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
Efficient and provably secure client-to-client password-based key exchange protocol
APWeb'06 Proceedings of the 8th Asia-Pacific Web conference on Frontiers of WWW Research and Development
Cryptanalysis of an improved client-to-client password-authenticated key exchange (C2C-PAKE) scheme
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
Flaws in generic watermarking protocols based on zero-knowledge proofs
IWDW'04 Proceedings of the Third international conference on Digital Watermarking
IWDW'04 Proceedings of the Third international conference on Digital Watermarking
Cryptanalysis of the n-party encrypted diffie-hellman key exchange using different passwords
ACNS'06 Proceedings of the 4th international conference on Applied Cryptography and Network Security
Secure cross-realm C2C-PAKE protocol
ACISP'06 Proceedings of the 11th Australasian conference on Information Security and Privacy
Watermarking is not cryptography
IWDW'06 Proceedings of the 5th international conference on Digital Watermarking
Secure spread spectrum watermarking for multimedia
IEEE Transactions on Image Processing
A buyer-seller watermarking protocol
IEEE Transactions on Image Processing
An efficient and anonymous buyer-seller watermarking protocol
IEEE Transactions on Image Processing
Analysis of a Buyer---Seller Watermarking Protocol for Trustworthy Purchasing of Digital Contents
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
We analyze the security of a fingerprinting scheme proposed at IWDW 2005. We show two results, namely that this scheme (1) does not provide seller security : a dishonest buyer can repudiate the fact that he redistributed a content, and (2) does not provide buyer security : a buyer can be framed by a malicious seller.