A Protocol for Anonymously Establishing Digital Provenance in Reseller Chains (Short Paper)

  • Ben Palmer
  • Kris Bubendorfer
  • Ian Welch
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7035)

Abstract

An increasing number of Internet traders exclusively sell digital products. These digital products can include media files, licenses, services, or subscriptions. We consider the concept of digital provenance in reseller chains. The goal of this work is to provide an honest customer with a guarantee on the origin and ownership history for a digital item even when the reseller they are dealing with is untrusted. We introduce a protocol called the Tagged Transaction protocol which uses a third party called the Tag Generation Centre (TGC) to provide a method for honest customers to check they are purchasing a legitimate item, anonymity for customers and resellers, a method for customers to resell items they have purchased to other customers, and verification of the TGC.

Keywords

Signature Scheme Digital Product Digital Item License Server Anonymous Credential 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Pointcheval, D., Stern, J.: Security Proofs for Signature Schemes. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 387–398. Springer, Heidelberg (1996)CrossRefGoogle Scholar
  2. 2.
    Schnorr, C.-P.: Efficient Identification and Signatures for Smart Cards. In: Quisquater, J.-J., Vandewalle, J. (eds.) EUROCRYPT 1989. LNCS, vol. 434, pp. 688–689. Springer, Heidelberg (1990)CrossRefGoogle Scholar
  3. 3.
    Dingledine, R., Mathewson, N., Syverson, P.: Tor: The second-generation onion router. In: Proceedings of the 13th USENIX Security Symposium (2004)Google Scholar
  4. 4.
    Nair, S.K., Popescu, B.C., Gamage, C., Crispo, B., Tanenbaum, A.S.: Enabling drm-preserving digital content redistribution. In: CEC 2005: Proceedings of the Seventh IEEE International Conference on E-Commerce Technology, pp. 151–158. IEEE Computer Society, Washington, DC (2005)Google Scholar
  5. 5.
    P1817, I.W.G.: Initial technical description of the p1817 standard. Technical report. IEEE (2010)Google Scholar
  6. 6.
    Serban, C., Chen, Y., Zhang, W., Minsky, N.: The concept of decentralized and secure electronic marketplace. Electronic Commerce Research 8(1-2), 79–101 (2008)CrossRefMATHGoogle Scholar
  7. 7.
    Camenisch, J., Van Herreweghen, E.: Design and implementation of the idemix anonymous credential system. In: CCS 2002: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 21–30. ACM, New York (2002)Google Scholar
  8. 8.
    Camenisch, J.L., Lysyanskaya, A.: An Efficient System for Non-Transferable Anonymous Credentials with Optional Anonymity Revocation. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 93–118. Springer, Heidelberg (2001)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Ben Palmer
    • 1
  • Kris Bubendorfer
    • 1
  • Ian Welch
    • 1
  1. 1.School of Engineering and Computer ScienceVictoria University of WellingtonNew Zealand

Personalised recommendations