메뉴 건너뛰기




Volumn , Issue , 2008, Pages 524-529

On secure and anonymous buyer-seller watermarking protocol

(2)  Deng, Mina a   Preneel, Bart a  

a NONE

Author keywords

[No Author keywords available]

Indexed keywords

COPYRIGHTS; CRYPTOGRAPHY; DIGITAL ARITHMETIC; DIGITAL WATERMARKING; ELECTRONIC COMMERCE; HELIUM; INDUSTRIAL ECONOMICS; INTERNET; INTERNET PROTOCOLS; MOBILE TELECOMMUNICATION SYSTEMS; PAPERMAKING; PURCHASING; SALES; WATERMARKING; WORLD WIDE WEB;

EID: 51049112011     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICIW.2008.28     Document Type: Conference Paper
Times cited : (34)

References (20)
  • 1
    • 35248843604 scopus 로고    scopus 로고
    • Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions
    • Topics in Cryptology, Eurocrypt 2003, Springer-Verlag
    • M. Bellare, D. Micciancio, and B. Warinschi. Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions. In Topics in Cryptology - Eurocrypt 2003, LNCS 2656, pages 614-629. Springer-Verlag, 2003.
    • (2003) LNCS , vol.2656 , pp. 614-629
    • Bellare, M.1    Micciancio, D.2    Warinschi, B.3
  • 2
    • 24144477851 scopus 로고    scopus 로고
    • Foundations of group signatures: The case of dynamic groups
    • Topics in Cryptology, CT-RSA 2005, Springer-Verlag
    • M. Bellare, H. Shi, and C. Zhang. Foundations of group signatures: the case of dynamic groups. In Topics in Cryptology - CT-RSA 2005, LNCS 3376, pages 136-153. Springer-Verlag, 2005.
    • (2005) LNCS , vol.3376 , pp. 136-153
    • Bellare, M.1    Shi, H.2    Zhang, C.3
  • 3
    • 84957670625 scopus 로고
    • Collusion-secure fingerprinting for digital data
    • D. Boneh and J. Shaw. Collusion-secure fingerprinting for digital data. LNCS 963, pages 452-465, 1995.
    • (1995) LNCS , vol.963 , pp. 452-465
    • Boneh, D.1    Shaw, J.2
  • 4
    • 84937417240 scopus 로고
    • Efficient anonymous fingerprinting with group signatures
    • ASIACRYPT, Springer-Verlag
    • J. Camenisch. Efficient anonymous fingerprinting with group signatures. In ASIACRYPT, LNCS 1976, pages 415-428. Springer-Verlag, 2000.
    • (1976) LNCS , pp. 415-428
    • Camenisch, J.1
  • 5
    • 35248847060 scopus 로고    scopus 로고
    • Practical verifiable encryption and decryption of discrete logarithms
    • Adv. in Cryptology, Crypto 2003, Springer-Verlag
    • J. Camenisch and V. Shoup. Practical verifiable encryption and decryption of discrete logarithms. In Adv. in Cryptology - Crypto 2003, LNCS 2729, pages 126-144. Springer-Verlag, 2003.
    • (2003) LNCS , vol.2729 , pp. 126-144
    • Camenisch, J.1    Shoup, V.2
  • 7
    • 85084161366 scopus 로고    scopus 로고
    • R. Dingledine, N. Mathewson, and P. Syverson. Tor: The second-generation onion router. In In Proceedings of the 13th USENIX Security Symposium, pages 303-320, August 2004.
    • R. Dingledine, N. Mathewson, and P. Syverson. Tor: The second-generation onion router. In In Proceedings of the 13th USENIX Security Symposium, pages 303-320, August 2004.
  • 8
    • 35048873815 scopus 로고    scopus 로고
    • Cryptanalysis of two anonymous buyer-seller watermarking protocols and an improvement for true anonymity
    • Applied Cryptography and Network Security
    • B.-M. Goi, R. C.-W. Phan, Y. Yang, F. Bao, R. H. Deng, and M. U. Siddiqi. Cryptanalysis of two anonymous buyer-seller watermarking protocols and an improvement for true anonymity. In Applied Cryptography and Network Security, LNCS 2587, pages 369-382, 2004.
    • (2004) LNCS , vol.2587 , pp. 369-382
    • Goi, B.-M.1    Phan, R.C.-W.2    Yang, Y.3    Bao, F.4    Deng, R.H.5    Siddiqi, M.U.6
  • 9
    • 0242372124 scopus 로고    scopus 로고
    • Does it need trusted third party? design of buyer-seller watermarking protocol without trusted third party
    • Applied Cryptography and Network Security
    • J.-H. P. Jae-Gwi Choi, Kouichi Sakurai. Does it need trusted third party? design of buyer-seller watermarking protocol without trusted third party. In Applied Cryptography and Network Security, LNCS 2846, pages 265-279, 2003.
    • (2003) LNCS , vol.2846 , pp. 265-279
    • Jae-Gwi Choi, J.-H.P.1    Sakurai, K.2
  • 11
    • 84867553981 scopus 로고
    • A generalisation, a simplification and some applications of paillier's probabilistic public-key system
    • 4th International Workshop on Practice and Theory in Public-Key Cryptography, Springer-Verlag
    • I. D. M. Jurik. A generalisation, a simplification and some applications of paillier's probabilistic public-key system. In 4th International Workshop on Practice and Theory in Public-Key Cryptography, LNCS 1992, pages 119-136. Springer-Verlag, 2001.
    • (1992) LNCS , pp. 119-136
    • Jurik, I.D.M.1
  • 14
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • Advances in Cryptology EUROCRYPT'99, Springer-Verlag
    • P. Paillier. Public-key cryptosystems based on composite degree residuosity classes. In Advances in Cryptology EUROCRYPT'99, LNCS 1592, pages 223-238. Springer-Verlag, 1999.
    • (1999) LNCS , vol.1592 , pp. 223-238
    • Paillier, P.1
  • 15
    • 84957647748 scopus 로고    scopus 로고
    • Coin-based anonymous fingerprinting
    • Advances in Cryptology EUROCRYPT'99, Springer-Verlag
    • B. Pfitzmann and A.-R. Sadeghi. Coin-based anonymous fingerprinting. In Advances in Cryptology EUROCRYPT'99, LNCS 1592, pages 150-164. Springer-Verlag, 1999.
    • (1999) LNCS , vol.1592 , pp. 150-164
    • Pfitzmann, B.1    Sadeghi, A.-R.2
  • 16
    • 84937405827 scopus 로고
    • Anonymous fingerprinting with direct non-repudiation
    • Advances in Cryptology ASIACRYPT '00, Springer-Verlag
    • B. Pfitzmann and A.-R. Sadeghi. Anonymous fingerprinting with direct non-repudiation. In Advances in Cryptology ASIACRYPT '00, LNCS 1976, pages 401-414. Springer-Verlag, 2000.
    • (1976) LNCS , pp. 401-414
    • Pfitzmann, B.1    Sadeghi, A.-R.2
  • 18
    • 84947921515 scopus 로고    scopus 로고
    • Asymmetric fngerprinting
    • Advances in Cryptology EUROCRYPT'96, Springer-Verlag
    • B. Pittzmann and M. Schunter. Asymmetric fngerprinting. In Advances in Cryptology EUROCRYPT'96, LNCS 1070, pages 84-95. Springer-Verlag, 1996.
    • (1996) LNCS , vol.1070 , pp. 84-95
    • Pittzmann, B.1    Schunter, M.2
  • 19
    • 37349092081 scopus 로고    scopus 로고
    • A privacy-preserving buyer-seller watermarking protocol with semi-trust third party
    • Trust, Privacy and Security in Digital Business, August
    • M.-H. Shao. A privacy-preserving buyer-seller watermarking protocol with semi-trust third party. In Trust, Privacy and Security in Digital Business, LNCS 4657, pages 44-53, August 2007.
    • (2007) LNCS , vol.4657 , pp. 44-53
    • Shao, M.-H.1
  • 20
    • 33645737923 scopus 로고    scopus 로고
    • Secure buyer-seller watermarking protocol
    • March
    • J. Zhang, W. Kou, and K. Fan. Secure buyer-seller watermarking protocol. In IEE Proceedings Information Security, volume 153, pages 15-18, March 2006.
    • (2006) IEE Proceedings Information Security , vol.153 , pp. 15-18
    • Zhang, J.1    Kou, W.2    Fan, K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.