119
Views
9
CrossRef citations to date
0
Altmetric
Original Articles

A Verifiable and Secret Buyer–Seller Watermarking Protocol

, , &
 

ABSTRACT

A trusted third party (TTP) is introduced to the buyer–seller protocol to guarantee the transaction fairness in protocol. However, the TTP practically increases the cost in the buyer–seller protocol. To address this issue, we propose a novel buyer–seller watermarking protocol to eliminate the need for a TTP. By dividing the buyer's secret key into two primary mechanisms: the buyer's watermark, embedded in digital content, and the transaction number produced by the seller; the seller can verify buyer's watermark without decryption. After inserting a digital watermark from the seller, the buyer cannot remove the watermark from the digital content without a watermark extraction algorithm. The seller cannot fabricate piracy to frame an innocent buyer. When piracy is found, it can be traced clearly because of the privacy homomorphism property. In other words, the proposed protocol can trace piracy and protect the customer's rights without a TTP. Therefore, the conspiracy problem can be solved. The proposed protocol also can protect the anonymity of the buyer and bind the buyer's watermark to digital content. Moreover, the buyer is no longer required to participate in the dispute resolution in our scheme.

ACKNOWLEDGEMENTS

This research was supported by the Ministry of Science and Technology, Taiwan, R.O.C., under contract number MOST 103-2622-E-212-009-CC2, MOST103-2632-E-324-001-MY3 and MOST 103-2221-E-324-023 and Collaborative Innovation Center for Modern Logistics and Business of Hubei (Cultivation).

Notations

Mreq=

An anonymous digital certificate request message issued by buyer (B)

CertB=

The anonymous digital certificate issued to buyer (B) which conforms the X.509 format

M=

Digital content

w=

Buyer's watermark

cw=

Encrypted buyer's watermark

SNM=

The product serial number of the digital content

i=

The serial number of the ith transaction

=

Concatenation operation

SNMi=

Transaction identification number, SNMi = SNMi

ARG=

Explicitly states the rights and obligations of buyer–seller and specifies the digital content

Sign=

The signature of the ARG and SNMi, which is signed using buyer and seller's secret key

=

Compare whether Y is equal to Z or not

g=

Public primitive element

pkB/skB=

The buyer's public/private key pair

pkBi/skBi=

The buyer's one time public/private key pair

pkS/skS=

The seller's public/ private key pair

pkCA=

The public key of the certification authority

=

Use the X's public key to encrypt message m

=

Use the X's private key to decrypt message m

=

Use the X's private key to sign message m

=

Use the X's public key to verify message m

=

Watermark inserts algorithm

=

Watermark extracts algorithm

Additional information

Notes on contributors

Chin-Ling Chen

Chin-Ling Chen was born in Taiwan in 1961. He received a BSc degree in Computer Science and Engineering from Feng Cha University in 1991, and the MSc degree and PhD in Applied Mathematics at National Chung Hsing University, Taichung, Taiwan, in 1999 and 2005, respectively. He is a member of the Chinese Association for Information Security. From 1979 to 2005, he was a senior engineer at Chunghwa Telecom Co., Ltd. He is currently a professor in the Department of Computer Science and Information Engineering at Chaoyang University of Technology, Taiwan. His research interests include cryptography, network security, and electronic commerce. Dr Chen has published over 50 articles on the above research fields in SCI/SSCI international journals.

E-mail: [email protected]

Chin-Chang Chen

Chin-Chang Chen was born in 1970. He received a Masters degree in Computer Science from the Institute of Information Engineering and Computer Science, National Chung Hsing University (NCHU), Taichung, Taiwan, in 2009. His research interests include information security and cryptology.

E-mail: [email protected]

De-Kui Li

De-Kui Li was born in 1979. He received MS and PhD degrees in Management Information System from Kwangwoon University, Seoul, South Korea, in 2012. His research interests include business intelligence and data mining.

E-mail: [email protected]

Po-Yueh Chen

Po-Yueh Chen received his BS, MS, and PhD degrees in EE from National Taiwan University in 1988, National Chiao Tung University in 1990 and University of Maryland at College Park in 1997, respectively. Dr Chen is now a faculty member in department of computer science and information engineering, National Changhua University of Education, Changhua, Taiwan. His research interests include image processing, FPGA implementations, VLSI architecture design, and digital IC design.

E-mail: [email protected]

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.