期刊文献+

一种新的无第三方参与的买方卖方水印协议

A new buyer-seller watermarking protocol without the third party
下载PDF
导出
摘要 提出了一种新的无第三方参与的买方卖方水印协议。该协议利用秘密共享和同态公钥密码体制思想,买方和卖方各随机产生部分秘密,交易时由卖方在加密的状态下将两个秘密合成一个秘密,并作为水印内容嵌入数字产品。该水印协议能很好地解决盗版追踪、消费者权益保护等问题,同时,由于没有第三方的参与,可以完全避免共谋问题的发生。 A new buyer-seller watermarking protocol without the third party was proposed, which used the idea of secret sharing and homomorphie public key cryptosystem. For a transaction, a piece of secret was produced by the buyer and the seller respectively, and the two pieces of secret were mixed into one secret in encrypted domain, which was embedded in a digital product as a watermark. The pirate tracing problem, the customer's problem and other problems can be solved by this watermark protocol. Meanwhile, the conspiracy problem can be completely avoided because of no the third party.
出处 《计算机应用》 CSCD 北大核心 2006年第7期1626-1627,1645,共3页 journal of Computer Applications
基金 国家自然科学基金资助项目(60372046) 华为基金资助项目(YSCB2005037NP)
关键词 版权保护 水印协议 无第三方参与 秘密共享 copyright protection watermarking protocol without the third party secret sharing
  • 相关文献

参考文献9

  • 1MEMO N, WONG PW. A buyer-seller watermarking protocol[ J].IEEE Transactions on Image Processing, 2001, 10(4):643 -649.
  • 2LEI CL, YU PL, TSAI PL, et al. An efficient and anonymous buyer-seller watermarking protocol[ J]. IEEE Transactions on Image Processing, 2004, 13(12) : 1618 - 1626.
  • 3JU HS, KIM HJ, LEE DH, et al. An anonymous buyer-seller watermarking protocol with anonymity control[ A]. ICISC 2002[ C].Berlin: Springer-Verlag, 2003, LNCS2587.421 - 432.
  • 4CHOI JG, SAKURAI K, PARK JH. Does it need trusted third party? Design of buyer-seller watermarking protocol without trusted third party[ A]. ACNS 2003 [ C]. Berlin: Springer-Verlag, 2003,LNCS2846. 265 - 279.
  • 5GOI B, PHAN PC, YANG Y, et al. Cryptanalysis of two anonymous buyer-seller watermarking protocols and an improvement for true anonymity [ A]. ACNS 2004 [ C]. Berlin: Springer-Verlag,2004, LNCS3089. 369 -382.
  • 6孙中伟,冯登国,武传坤.基于加同态公钥密码体制的匿名数字指纹方案[J].软件学报,2005,16(10):1816-1821. 被引量:9
  • 7PAILLIER P. Public key cryptosystems based on composite degree residuodity classes[A].Eurocrypt'99[C]. Berlin: Springer-Verlag,1999, LNCS1592. 223 - 238.
  • 8BRESSON E, CATALANO D, POINTCHEVAL D. A simple public key cryptosystem with a double trapdoor decryption mechanism and its applications[A]. Asiacrypt 2003[C]. Berlin: Springer-Verlag,2003, LNCS2894.37 -54.
  • 9COX I, KILIAN J, LEIGHTON T, et al. Secure spread spectrum watermarking for multimedia[J]. IEEE Transactions on Image Proceasing, 1997, 6(12) : 1673 - 1687.

二级参考文献16

  • 1吕述望 王彦 刘振华.非对称数字指纹技术[A].北京电子技术应用研究所.全国第四届信息隐藏研讨会论文集[C].北京:机械工业出版社,2002.105-111.
  • 2Pfitzmann B, Waidner M. Anonymous fingerprinting. In: Walter F, ed. Eurocrypt'97. LNCS 1233, Berlin: Springer-Verlag, 1997.88-102.
  • 3Domingo-Ferrer J. Anonymous fingerprinting based on committed oblivious tranfer. In: Imai H, Zheng Y, eds. PKC'99. LNCS 1560, Berlin: Springer-Verlag, 1999.43-52.
  • 4Chung C, Choi S, Choi Y, Won D. Efficient anonymous fingerprinting of electronic information with improved automatic identification of redistributors. In: Won D, ed. Information Security and Cryptology-ICISC 2000. LNCS 2015, Berlin:Springer-Verlag, 2000. 221-234.
  • 5Camenisch J. Efficient anonymous fingerprinting with group signatures. In: Okamoto T, ed. Advances in Cryptology-Asiacrypt 2000. LNCS 1976, Berlin: Springer-Verlag, 2000. 415-428.
  • 6Memon N, Wong PW. A Buyer-Seller watermarking protocol. IEEE Trans. on Image Processing, 2001,10(4):643-649.
  • 7Ju HS, Kim HJ, Lee DH, Lim JI. An anonymous Buyer-Seller watermarking protocol with anonymity control. In: Lee PJ, Lim CH,eds. ICISC 2002. LNCS 2587, Berlin: Springer-Verlag, 2002. 421-432.
  • 8Choi JG, Sakurai K, Park JH. Does it need trusted third party? Design of Buyer-Seller watermarking protocol without trusted third party. In: Zhou J, Yung M, Han Y, eds. Applied Cryptography and Network Security 2003. LNCS 2846, Berlin: Springer-Verlag,2003. 265-279.
  • 9Goi B, Phan RC, Yang Y, Bao F, Deng RH, Siddiqi MU. Cryptanalysis of two anonymous Buyer-Seller watermarking protocols and an improvement for true anonymity. In: Jakobsson M, Yung M, Zhou J, eds. Applied Cryptography and Network Security 2004.LNCS 3089, Berlin: Springer-Verlag, 2004. 369-382.
  • 10Domingo-Ferrer J. Anonymous fingerprinting of electronic information with automatic identification ofredistributors. Electronics Letters, 1998,34(13):1303-1304.

共引文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部