Fingerprinting long forgiving messages
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
Untraceable off-line cash in wallet with observers
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
An Efficient Verifiable Encryption Scheme for Encryption of Discrete Logarithms
CARDIS '98 Proceedings of the The International Conference on Smart Card Research and Applications
CRYPTO '88 Proceedings of the 8th Annual International Cryptology Conference on Advances in Cryptology
Collusion-Secure Fingerprinting for Digital Data (Extended Abstract)
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Zero Knowledge Watermark Detection
IH '99 Proceedings of the Third International Workshop on Information Hiding
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Publicly verifiable secret sharing
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Coin-based anonymous fingerprinting
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Optimistic fair exchange of digital signatures
IEEE Journal on Selected Areas in Communications
Secure spread spectrum watermarking for multimedia
IEEE Transactions on Image Processing
A buyer-seller watermarking protocol
IEEE Transactions on Image Processing
Network Security Using Biometric and Cryptography
ACIVS '08 Proceedings of the 10th International Conference on Advanced Concepts for Intelligent Vision Systems
IWDW '07 Proceedings of the 6th International Workshop on Digital Watermarking
Secure multimedia content delivery with multiparty multilevel DRM architecture
Proceedings of the 18th international workshop on Network and operating systems support for digital audio and video
Classification Framework for Fair Content Tracing Protocols
IWDW '09 Proceedings of the 8th International Workshop on Digital Watermarking
Joint watermarking scheme for multiparty multilevel DRM architecture
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
Analysis of a Buyer---Seller Watermarking Protocol for Trustworthy Purchasing of Digital Contents
Wireless Personal Communications: An International Journal
A provably secure anonymous buyer-seller watermarking protocol
IEEE Transactions on Information Forensics and Security
Ring-based anonymous fingerprinting scheme
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
Cryptanalysis of a generalized anonymous buyer-seller watermarking protocol of IWDW 2004
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
IWDW'04 Proceedings of the Third international conference on Digital Watermarking
An efficient fingerprinting scheme with secret sharing
DRMTICS'05 Proceedings of the First international conference on Digital Rights Management: technologies, Issues, Challenges and Systems
A privacy-preserving buyer-seller watermarking protocol with semi-trust third party
TrustBus'07 Proceedings of the 4th international conference on Trust, Privacy and Security in Digital Business
An asymmetric fingerprinting code for collusion-resistant buyer-seller watermarking
Proceedings of the first ACM workshop on Information hiding and multimedia security
Hi-index | 0.00 |
Anonymity is one of important requirements for electronic marketplaces to offer similar privacy as current marketplace. Unfortunately, most watermarking protocols in the literature have been developed without considering a buyer's anonymity. It would be unsatisfactory for the buyer to reveal his/her identity to purchase multimedia contents. In this paper we propose an anonymous buyer-seller watermarking protocol, where a buyer can purchase contents anonymously, but anonymity control is provided, i.e., a seller can trace the identity of a copyright violator. The proposed scheme also provides unlinkability of contents purchased by a buyer. Another distinct feature of our scheme is that the identification of an illegal buyer is accomplished in a way such that the seller can directly convince a judge that the buyer has redistributed contents. This feature removes any possibility of dispute. Furthermore, when the innocent buyer is falsely accused by a malicious seller, it is possible to prove his/her innocence without attending a court and revealing any privacy.