2004
DOI: 10.1007/978-3-540-24624-4_45
|View full text |Cite
|
Sign up to set email alerts
|

Public Watermark Detection Using Multiple Proxies and Secret Sharing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2006
2006
2011
2011

Publication Types

Select...
2
2

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 12 publications
0
5
0
Order By: Relevance
“…SECURITY ANALYSIS Following the discussion in ref. [7], the security considerations of the system consists of two categories: (a) maintaining the secrecy of W, and (b) protecting the interest of the verifier.…”
Section: B Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…SECURITY ANALYSIS Following the discussion in ref. [7], the security considerations of the system consists of two categories: (a) maintaining the secrecy of W, and (b) protecting the interest of the verifier.…”
Section: B Detectionmentioning
confidence: 99%
“…Although these schemes are cryptographically secure, a main drawback is the large number of rounds and bandwidth required in the communications, and they are not easy to implement in practice. In ref [7], the authors propose a public watermarking scheme using multiple proxies and secret sharing. In their setting, they remove the expensive zero-knowledge interactive proofs without assuming the existence of a trusted third party.…”
Section: Introductionmentioning
confidence: 99%
“…Following the discussion in ref. [8], the security considerations of the system consists of two categories: (a) maintaining the secrecy of W, and (b) protecting the interest of the verifier.…”
Section: Security Analysismentioning
confidence: 99%
“…Although these schemes are cryptographically secure, a main drawback is the large number of rounds and bandwidth required in the communications, and they are not easy to implement in practice. In ref [8], the authors propose a public watermarking scheme using multiple proxies and secret sharing. In their setting, they remove the expensive zero-knowledge interactive proofs without assuming the existence of a trusted third party.…”
Section: Introductionmentioning
confidence: 99%
“…Unfortunately, known methods are not satisfactory and there are a number of successful attacks [12]. An alternative is to replace the TTP with a group of proxies [16] and employ a secret sharing scheme, where the security is achieved if the majority of the parties are honest. The scheme also allows the owner to delegate watermark detection to third-parties without revealing her secret watermark.…”
Section: Related Workmentioning
confidence: 99%