13.07.2015 Views

E-Commerce

E-Commerce

E-Commerce

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

196E-<strong>Commerce</strong>E( pk * pkW*pkBBB*pkB*X´´) E ( X´) E ( W ) E ( X´ ) (3)Where denotes the watermark insertion operation in the message space, and denotes the corresponding operation in the encrypted domain. Note that thecomputation is possible because we assume the encryption E ( ) is privacyhomomorphic with respect to . Alice storesWA, V ,pk B*WAand Bob's information inTableA, and delivers the encrypted content X ´´ to Bob.5) After decryption Dsk Epk( )) , Bob obtains the watermarked content X ´´ fromAlice.( WB*B*6.3 Identification and Arbitration ProtocolThe identification and arbitration protocol is executed among the seller Alice A, an judgeJ, and the CA, as depicted in Fig. 7.1) In case Alice finds a pirated copy Y of X , she extracts the watermark U from Y ,and searches the sales record by correlating U with every V inTable . Then sheprovides all relevant information together with the intermediate watermarked contentX ´ to J.2) If the signature provided by Alice is verified, J accepts the case and forwards the seller'skey escrow cipher to the CA to recover the private key of the buyer.3) The CA decrypts the cipher, recovers the key, and returns the encrypted valueEJ) to J.( *pksk B4) After J obtains the buyer's key by decryption D E ( sk )) , he further obtainsskB*ewsk(pk*J J Bthe buyer's secret watermark W D ( ) . Then J compares the extractedwatermark from X ´ and Y provided by Alice, with the one that is derived from therecovered watermarks W , ) from the buyer and the seller. If they match with a( W A Bhigh correlation, the suspected buyer is proven to be guilty. Otherwise, the buyer isinnocent. Note that until now, the buyer's identity is unexposed.5) To recover the buyer's identity, J orders the CA to open the buyer's group signature,with the group manager's secret key gmsk .6) Upon receiving the recovered identity B and a claim proof , J verifies the CA's claim.7) If verified, J closes the case and announces that the buyer with identity B is guilty.A7. Security AnalysisIn this section, we analyze the security properties of the proposed scheme. The soundnessand completeness of the protocol rely on the security and robustness of the underlyingcryptographic and watermarking primitives.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!