13.07.2015 Views

E-Commerce

E-Commerce

E-Commerce

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

188E-<strong>Commerce</strong>Table 2. Notations and abbreviationsFig. 1. The registration protocol in Lei et al.'s protocol (Lei et al., 2004).2.2 Attack on the Seller's SecurityCollusion of the buyer and the WCA. Besides the conspiracy attack explained above, amalicious buyer and the untrustworthy WCA can also collude. In this case, the WCA informsBob the actual value of W directly, so that it is possible for Bob to remove his watermarkfrom the watermarked digital content. Therefore, non-repudiation won't hold, and theprotocol fails to provide security for the seller.2.3 Failure for Probabilistic CryptosystemsIn the arbitration and identification protocol, the WCA is required by the arbitrator J todecrypt Epk WCA( W ) and obtain the Bob's watermark W . Then J performs a validation on thecorrectness of the value Epk WCA( W ) sent by Alice, by computing the encryption of Wobtained from the WCA with the buyer's public key pk * as E ( )B pk WCAW . If E ( pkW ) is notB*

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!