{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T03:56:34Z","timestamp":1742961394565,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":38,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540922377"},{"type":"electronic","value":"9783540922384"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-92238-4_4","type":"book-chapter","created":{"date-parts":[[2008,12,16]],"date-time":"2008-12-16T06:04:33Z","timestamp":1229407473000},"page":"34-44","source":"Crossref","is-referenced-by-count":0,"title":["(In)Security of an Efficient Fingerprinting Scheme with Symmetric and Commutative Encryption of IWDW 2005"],"prefix":"10.1007","author":[{"given":"Raphael C. -W.","family":"Phan","sequence":"first","affiliation":[]},{"given":"Bok-Min","family":"Goi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"162","DOI":"10.1007\/3-540-45247-8_13","volume-title":"ICICS 2000","author":"F. Bao","year":"2001","unstructured":"Bao, F., Deng, R.H., Feng, P.: An Efficient and Practical Scheme for Privacy Protection in the E-commerce of Digital Goods. In: ICICS 2003. LNCS, vol.\u00a02836, pp. 162\u2013170. Springer, Heidelberg (2001)"},{"key":"4_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"180","DOI":"10.1007\/3-540-39799-X_15","volume-title":"Advances in Cryptology","author":"G. Blakley","year":"1986","unstructured":"Blakley, G., Meadows, C., Purdy, G.B.: Fingerprinting Long Forgiving Messages. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol.\u00a0218, pp. 180\u2013189. Springer, Heidelberg (1986)"},{"key":"4_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"452","DOI":"10.1007\/3-540-44750-4_36","volume-title":"Advances in Cryptology - CRYPTO \u201995","author":"D. Boneh","year":"1995","unstructured":"Boneh, D., Shaw, J.: Collusion-secure Fingerprinting for Digital Data. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol.\u00a0963, pp. 452\u2013465. Springer, Heidelberg (1995)"},{"key":"4_CR4","volume-title":"Security Engineering: A Guide to Building Dependable Distributed Systems","author":"R. Anderson","year":"2001","unstructured":"Anderson, R.: Security Engineering: A Guide to Building Dependable Distributed Systems. Wiley Publishing, U.S (2001)"},{"key":"4_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/3-540-39118-5_12","volume-title":"Advances in Cryptology - EUROCRYPT \u201987","author":"E.F. Brickell","year":"1988","unstructured":"Brickell, E.F., Yacobi, Y.: On Privacy Homormorphisms. In: Price, W.L., Chaum, D. (eds.) EUROCRYPT 1987. LNCS, vol.\u00a0304, pp. 117\u2013125. Springer, Heidelberg (1988)"},{"key":"4_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"830","DOI":"10.1007\/11610113_81","volume-title":"Frontiers of WWW Research and Development - APWeb 2006","author":"J.W. Byun","year":"2006","unstructured":"Byun, J.W., Lee, D.H., Lim, J.: Efficient and Provably Secure Client-to-Client Password-based Key Exchange Protocol. In: Zhou, X., Li, J., Shen, H.T., Kitsuregawa, M., Zhang, Y. (eds.) APWeb 2006. LNCS, vol.\u00a03841, pp. 830\u2013836. Springer, Heidelberg (2006)"},{"key":"4_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/3-540-39118-5_13","volume-title":"Advances in Cryptology - EUROCRYPT \u201987","author":"D. Chaum","year":"1988","unstructured":"Chaum, D.: An Improved Protocol for Demonstrating Possession of Discrete Logarithms and some Generalizations. In: Price, W.L., Chaum, D. (eds.) EUROCRYPT 1987. LNCS, vol.\u00a0304, pp. 127\u2013141. Springer, Heidelberg (1988)"},{"key":"4_CR8","unstructured":"Chang, C.C., Chung, C.Y.: An Enhanced Buyer-Seller Watermarking Protocol. In: Proceedings of ICCT 2003, pp. 1779\u20131783 (2003)"},{"key":"4_CR9","unstructured":"Cheung, S.C., Leung, H.F., Wang, C.: A Commutative Encrypted Protocol for the Privacy Protection of Watermarks in Digital Contents. In: Proceedings of HICSS-37 (January 2004)"},{"key":"4_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/978-3-540-45203-4_21","volume-title":"Applied Cryptography and Network Security","author":"J.-G. Choi","year":"2003","unstructured":"Choi, J.-G., Sakurai, K., Park, J.H.: Does It Need Trusted Third Party? Design of Buyer-Seller Watermarking Protocol without Trusted Third Party. In: Zhou, J., Yung, M., Han, Y. (eds.) ACNS 2003. LNCS, vol.\u00a02846, pp. 265\u2013279. Springer, Heidelberg (2003)"},{"key":"4_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1007\/978-3-540-31805-7_20","volume-title":"Digital Watermarking","author":"J.-G. Choi","year":"2005","unstructured":"Choi, J.-G., Park, J.H.: A Generalization of an Anonymous Buyer-Seller Watermarking Protocol and Its Application to Mobile Communications. In: Cox, I., Kalker, T., Lee, H.-K. (eds.) IWDW 2004. LNCS, vol.\u00a03304, pp. 232\u2013243. Springer, Heidelberg (2005)"},{"key":"4_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/978-3-540-30114-1_18","volume-title":"Information Hiding","author":"J.-G. Choi","year":"2004","unstructured":"Choi, J.-G., Park, J.H., Kwon, K.R.: Analysis of COT-based Fingerprinting Schemes: New Approaches to Design Practical and Secure Fingerprinting Scheme. In: Fridrich, J. (ed.) IH 2004. LNCS, vol.\u00a03200, pp. 253\u2013265. Springer, Heidelberg (2004)"},{"key":"4_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11922841_1","volume-title":"Digital Watermarking","author":"I.J. Cox","year":"2006","unstructured":"Cox, I.J., Doerr, G.J., Furon, T.: Watermarking is Not Cryptography. In: Shi, Y.Q., Jeon, B. (eds.) IWDW 2006. LNCS, vol.\u00a04283, pp. 1\u201315. Springer, Heidelberg (2006)"},{"issue":"12","key":"4_CR14","doi-asserted-by":"publisher","first-page":"1673","DOI":"10.1109\/83.650120","volume":"6","author":"I.J. Cox","year":"1997","unstructured":"Cox, I.J., Kilian, J., Leighton, T., Shamoon, T.: Secure Spread Spectrum Watermarking for Images, Audio and Video. IEEE Trans. on Image Processing\u00a06(12), 1673\u20131678 (1997)","journal-title":"IEEE Trans. on Image Processing"},{"key":"4_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/3-540-49162-7_4","volume-title":"Public Key Cryptography","author":"J. Domingo-Ferrer","year":"1999","unstructured":"Domingo-Ferrer, J.: Anonymous Fingerprinting based on Committed Oblivious Transfer. In: Imai, H., Zheng, Y. (eds.) PKC 1999. LNCS, vol.\u00a01560, pp. 43\u201352. Springer, Heidelberg (1999)"},{"issue":"13","key":"4_CR16","doi-asserted-by":"publisher","first-page":"1303","DOI":"10.1049\/el:19980961","volume":"43","author":"J. Domingo-Ferrer","year":"1998","unstructured":"Domingo-Ferrer, J.: Anonymous Fingerprinting of Electronic Information with Automatic Identification Redistributors. IEE Electronics Letters\u00a043(13), 1303\u20131304 (1998)","journal-title":"IEE Electronics Letters"},{"key":"4_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"951","DOI":"10.1007\/978-3-540-74472-6_77","volume-title":"Computational Science and Its Applications \u2013 ICCSA 2007","author":"B.-M. Goi","year":"2007","unstructured":"Goi, B.-M., Phan, R.C.-W., Chuah, H.-T.: Cryptanalysis of Two Non-Anonymous Buyer-Seller Watermarking Protocols for Content Protection. In: Gervasi, O., Gavrilova, M.L. (eds.) ICCSA 2007, Part I. LNCS, vol.\u00a04705, pp. 951\u2013960. Springer, Heidelberg (2007)"},{"key":"4_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"936","DOI":"10.1007\/11596042_96","volume-title":"Embedded and Ubiquitous Computing \u2013 EUC 2005 Workshops","author":"B.-M. Goi","year":"2005","unstructured":"Goi, B.-M., Phan, R.C.-W., Siddiqi, M.U.: Cryptanalysis of a Generalized Anonymous Buyer-Seller Watermarking Protocol of IWDW 2004. In: Enokido, T., Yan, L., Xiao, B., Kim, D.Y., Dai, Y.-S., Yang, L.T. (eds.) EUC-WS 2005. LNCS, vol.\u00a03823, pp. 936\u2013944. Springer, Heidelberg (2005)"},{"key":"4_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1007\/978-3-540-24852-1_27","volume-title":"Applied Cryptography and Network Security","author":"B.-M. Goi","year":"2004","unstructured":"Goi, B.-M., Phan, R.C.-W., Yang, Y., Bao, F., Deng, R.H., Siddiqi, M.U.: Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and An Improvement for True Anonymity. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, vol.\u00a03089, pp. 369\u2013382. Springer, Heidelberg (2004)"},{"key":"4_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1007\/3-540-36552-4_29","volume-title":"Information Security and Cryptology - ICISC 2002","author":"H.S. Ju","year":"2003","unstructured":"Ju, H.S., Kim, H.J., Lee, D.H., Lim, J.I.: An Anonymous Buyer-Seller Watermarking Protocol with Anonymity Control. In: Lee, P.J., Lim, C.H. (eds.) ICISC 2002. LNCS, vol.\u00a02587, pp. 421\u2013432. Springer, Heidelberg (2003)"},{"key":"4_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1007\/978-3-540-24624-4_4","volume-title":"Digital Watermarking","author":"S. Katzenbeisser","year":"2004","unstructured":"Katzenbeisser, S.: On the Integration of Watermarks and Cryptography. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol.\u00a02939, pp. 50\u201360. Springer, Heidelberg (2004)"},{"key":"4_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"895","DOI":"10.1007\/978-3-540-24707-4_102","volume-title":"Computational Science and Its Applications \u2013 ICCSA 2004","author":"J. Kim","year":"2004","unstructured":"Kim, J., Kim, S., Kwak, J., Won, D.: Cryptanalysis and Improvement of Password-Authenticated Key Exchange Scheme between Clients with Different Passwords. In: Lagan\u00e1, A., Gavrilova, M.L., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds.) ICCSA 2004. LNCS, vol.\u00a03043, pp. 895\u2013902. Springer, Heidelberg (2004)"},{"key":"4_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1007\/3-540-45311-3_3","volume-title":"Progress in Cryptology - INDOCRYPT 2001","author":"M. Kuribayashi","year":"2001","unstructured":"Kuribayashi, M., Tanaka, H.: A New Anonymous Fingerprinting Scheme with High Enciphering Rate. In: Pandu Rangan, C., Ding, C. (eds.) INDOCRYPT 2001. LNCS, vol.\u00a02247, pp. 30\u201339. Springer, Heidelberg (2001)"},{"key":"4_CR24","doi-asserted-by":"crossref","unstructured":"Lei, C.-L., Yu, P.-L., Tsai, P.-L., Chan, M.-H.: An Efficient and Anonymous Buyer-Seller Watermarking Protocol. IEEE Trans. on Image Processing\u00a013(12) (December 2004)","DOI":"10.1109\/TIP.2004.837553"},{"key":"4_CR25","doi-asserted-by":"crossref","unstructured":"Memon, N., Wong, P.W.: A Buyer-Seller Watermarking Protocol. IEEE Trans. on Image Processing\u00a010(4) (April 2001)","DOI":"10.1109\/83.913598"},{"key":"4_CR26","volume-title":"Handbook of Applied Cryptography","author":"A.J. Menezes","year":"1997","unstructured":"Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, U.S (1997)"},{"key":"4_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1007\/3-540-48910-X_11","volume-title":"Advances in Cryptology - EUROCRYPT \u201999","author":"B. Pfitzmann","year":"1999","unstructured":"Pfitzmann, B., Sadeghi, A.R.: Coin-Based Anonymous Fingerprinting. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol.\u00a01592, pp. 150\u2013164. Springer, Heidelberg (1999)"},{"key":"4_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1007\/3-540-68339-9_8","volume-title":"Advances in Cryptology - EUROCRYPT \u201996","author":"B. Pfitzmann","year":"1996","unstructured":"Pfitzmann, B., Schunter, M.: Asymmetric Fingerprinting. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol.\u00a01070, pp. 84\u201395. Springer, Heidelberg (1996)"},{"key":"4_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1007\/3-540-69053-0_8","volume-title":"Advances in Cryptology - EUROCRYPT \u201997","author":"B. Pfitzmann","year":"1997","unstructured":"Pfitzmann, B., Waidner, M.: Anonymous Fingerprinting. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol.\u00a01233, pp. 88\u2013102. Springer, Heidelberg (1997)"},{"key":"4_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/11496137_3","volume-title":"Applied Cryptography and Network Security","author":"R.C.-W. Phan","year":"2005","unstructured":"Phan, R.C.-W., Goi, B.-M.: Cryptanalysis of an Improved Client-to-Client Password-Authenticated Key Exchange (C2C-PAKE) Scheme. In: Ioannidis, J., Keromytis, A., Yung, M. (eds.) ACNS 2005. LNCS, vol.\u00a03531, pp. 33\u201339. Springer, Heidelberg (2005)"},{"key":"4_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1007\/11767480_15","volume-title":"Applied Cryptography and Network Security","author":"R.C.-W. Phan","year":"2006","unstructured":"Phan, R.C.-W., Goi, B.-M.: Cryptanalysis of the N-Party Encrypted Diffie-Hellman Key Exchange using Different Passwords. In: Zhou, J., Yung, M., Bao, F. (eds.) ACNS 2006. LNCS, vol.\u00a03989, pp. 226\u2013238. Springer, Heidelberg (2006)"},{"key":"4_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1007\/11941378_9","volume-title":"Progress in Cryptology - INDOCRYPT 2006","author":"R.C.-W. Phan","year":"2006","unstructured":"Phan, R.C.-W., Goi, B.-M.: Cryptanalysis of Two Provably Secure Cross-Realm C2C-PAKE Protocols. In: Barua, R., Lange, T. (eds.) INDOCRYPT 2006. LNCS, vol.\u00a04329, pp. 104\u2013117. Springer, Heidelberg (2006)"},{"key":"4_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1007\/978-3-540-31805-7_16","volume-title":"Digital Watermarking","author":"R.C.-W. Phan","year":"2005","unstructured":"Phan, R.C.-W., Ling, H.-C.: Flaws in Generic Watermarking Protocols based on Zero-Knowledge Proofs. In: Cox, I., Kalker, T., Lee, H.-K. (eds.) IWDW 2004. LNCS, vol.\u00a03304, pp. 184\u2013191. Springer, Heidelberg (2005)"},{"issue":"3","key":"4_CR34","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1006\/jvci.1998.0391","volume":"9","author":"L. Qiao","year":"1998","unstructured":"Qiao, L., Nahrstedt, K.: Watermarking Schemes and Protocols for Protecting Rightful Ownership and Customer\u2019s Rights. Journal of Visual Communication and Image Representation\u00a09(3), 194\u2013210 (1998)","journal-title":"Journal of Visual Communication and Image Representation"},{"key":"4_CR35","doi-asserted-by":"crossref","unstructured":"Trappe, W., Wu, M., Liu, K.: Collusion-resistant Fingerprinting for Multimedia. In: Proceedings of IEEE ICASSP 2002, pp. 3309\u20133312 (2002)","DOI":"10.1109\/ICASSP.2002.5745361"},{"key":"4_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1007\/11780656_33","volume-title":"Information Security and Privacy","author":"Y. Yin","year":"2006","unstructured":"Yin, Y., Bao, L.: Secure Cross-Realm C2C-PAKE Protocol. In: Batten, L.M., Safavi-Naini, R. (eds.) ACISP 2006. LNCS, vol.\u00a04058, pp. 395\u2013406. Springer, Heidelberg (2006)"},{"key":"4_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1007\/11551492_5","volume-title":"Digital Watermarking","author":"S. Yong","year":"2005","unstructured":"Yong, S., Lee, S.-H.: An Efficient Fingerprinting Scheme with Symmetric and Commutative Encryption. In: Barni, M., Cox, I., Kalker, T., Kim, H.-J. (eds.) IWDW 2005. LNCS, vol.\u00a03710, pp. 54\u201366. Springer, Heidelberg (2005)"},{"issue":"1","key":"4_CR38","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1049\/ip-ifs:20055069","volume":"153","author":"J. Zhang","year":"2006","unstructured":"Zhang, J., Kou, W., Fan, K.: Secure Buyer-Seller Watermarking Protocol. IEE Proceedings - Information Security\u00a0153(1), 15\u201318 (2006)","journal-title":"IEE Proceedings - Information Security"}],"container-title":["Lecture Notes in Computer Science","Digital Watermarking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-92238-4_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T11:57:54Z","timestamp":1558267074000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-92238-4_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540922377","9783540922384"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-92238-4_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}