kth.sePublications
Change search
Link to record
Permanent link

Direct link
Terelius, Björn
Publications (5 of 5) Show all publications
Terelius, B. (2013). Towards transferable watermarks in buyer-seller watermarking protocols. In: Proceedings of the 2013 IEEE International Workshop on Information Forensics and Security, WIFS 2013: . Paper presented at 2013 5th IEEE International Workshop on Information Forensics and Security, WIFS 2013, 18 November 2013 through 21 November 2013, Guangzhou, China (pp. 197-202). IEEE conference proceedings
Open this publication in new window or tab >>Towards transferable watermarks in buyer-seller watermarking protocols
2013 (English)In: Proceedings of the 2013 IEEE International Workshop on Information Forensics and Security, WIFS 2013, IEEE conference proceedings, 2013, p. 197-202Conference paper, Published paper (Refereed)
Abstract [en]

Buyer-seller watermarking protocols are protocols that let a seller embed a watermark which uniquely identifies the buyer of each sold copy of some work without allowing the seller to learn the watermark. The purpose of such protocols is to deter buyers from illegally redistributing the work while protecting the buyer from being framed by dishonest sellers. Existing buyer-seller watermarking schemes require that every buyer receives his or her copy directly from the seller. We consider the problem of extending buyer-seller watermarking to allow (controlled) redistribution between buyers while maintaining a watermark that uniquely identifies each recipient. An efficient and secure protocol of this type could allow distribution of digital content in peer-to-peer networks while protecting the owner's copyright. We give a proof-of-concept protocol which only requires limited interaction with the original seller to change the watermark.

Place, publisher, year, edition, pages
IEEE conference proceedings, 2013
National Category
Other Computer and Information Science
Identifiers
urn:nbn:se:kth:diva-147493 (URN)10.1109/WIFS.2013.6707818 (DOI)000346136700034 ()2-s2.0-84894129214 (Scopus ID)978-146735593-3 (ISBN)
Conference
2013 5th IEEE International Workshop on Information Forensics and Security, WIFS 2013, 18 November 2013 through 21 November 2013, Guangzhou, China
Note

QC 20140627

Available from: 2014-06-27 Created: 2014-06-27 Last updated: 2024-03-18Bibliographically approved
Khazaei, S., Terelius, B. & Wikström, D. (2012). Cryptanalysis of a universally verifiable efficient re-encryption mixnet. In: 2012 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections, EVT/WOTE 2012: . Paper presented at 2012 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections, EVT/WOTE 2012, co-located with the 21st USENIX Security Symposium, 6 August 2012 through 7 August 2012, Bellevue. USENIX Association
Open this publication in new window or tab >>Cryptanalysis of a universally verifiable efficient re-encryption mixnet
2012 (English)In: 2012 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections, EVT/WOTE 2012, USENIX Association , 2012Conference paper, Published paper (Refereed)
Abstract [en]

We study the heuristically secure mix-net proposed by Puiggalí and Guasch (EVOTE 2010). We present practical attacks on both correctness and privacy for some sets of parameters of the scheme. Although our attacks only allow us to replace a few inputs, or to break the privacy of a few voters, this shows that the scheme can not be proven secure.

Place, publisher, year, edition, pages
USENIX Association, 2012
Keywords
Electronic voting, Voting machines, Mix-net, Re-encryption, Cryptography
National Category
Computer Sciences
Identifiers
urn:nbn:se:kth:diva-314743 (URN)2-s2.0-84906222651 (Scopus ID)
Conference
2012 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections, EVT/WOTE 2012, co-located with the 21st USENIX Security Symposium, 6 August 2012 through 7 August 2012, Bellevue
Note

QC 20220623

Available from: 2022-06-23 Created: 2022-06-23 Last updated: 2022-06-25Bibliographically approved
Khazaei, S., Terelius, B. & Wikström, D. (2012). Cryptanalysis of a Universally Verifiable Efficient Re-encryption Mixnet.
Open this publication in new window or tab >>Cryptanalysis of a Universally Verifiable Efficient Re-encryption Mixnet
2012 (English)Manuscript (preprint) (Other academic)
Abstract [en]

We study the heuristically secure mix-net proposed by Puiggal´ı and Guasch (EVOTE2010). We present practical attacks on both correctness and privacy for some sets of parametersof the scheme. Although our attacks only allow us to replace a few inputs, or tobreak the privacy of a few voters, this shows that the scheme can not be proven secure.

National Category
Computer Sciences
Identifiers
urn:nbn:se:kth:diva-112831 (URN)
Note

QC 20130220

Available from: 2013-01-14 Created: 2013-01-14 Last updated: 2024-03-18Bibliographically approved
Terelius, B. & Wikström, D. (2012). Efficiency limitations of Σ-protocols for group homomorphisms revisited. In: Security and Cryptography for Networks. Paper presented at 8th International Conference on Security and Cryptography for Networks, SCN 2012, 5 September 2012 through 7 September 2012, Amalfi (pp. 461-476). Springer Berlin/Heidelberg
Open this publication in new window or tab >>Efficiency limitations of Σ-protocols for group homomorphisms revisited
2012 (English)In: Security and Cryptography for Networks, Springer Berlin/Heidelberg, 2012, p. 461-476Conference paper, Published paper (Refereed)
Abstract [en]

We study the problem of constructing efficient proofs of knowledge of preimages of general group homomorphisms. We simplify and extend the recent negative results of Bangerter et al. (TCC 2010) to constant round (from three-message) generic protocols over concrete (instead of generic) groups, i.e., we prove lower bounds on both the soundness error and the knowledge error of such protocols. We also give a precise characterization of what can be extracted from the prover in the direct (common) generalization of the Guillou-Quisquater and Schnorr protocols to the setting of general group homomorphisms. Then we consider some settings in which these bounds can be circumvented. For groups with no subgroups of small order we present: (1) a three-move honest verifier zero-knowledge argument under some set-up assumptions and the standard discrete logarithm assumption, and (2) a Σ-proof of both the order of the group and the preimage. The former may be viewed as an offline/online protocol, where all slow cut-andchoose protocols can be moved to an offline phase.

Place, publisher, year, edition, pages
Springer Berlin/Heidelberg, 2012
Series
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743 ; 7485 LNCS
Keywords
Discrete logarithms, Efficiency limitations, Lower bounds, Offline, Preimages, Zero knowledge, Cryptography, Algebra
National Category
Computer Sciences
Identifiers
urn:nbn:se:kth:diva-105313 (URN)10.1007/978-3-642-32928-9_26 (DOI)2-s2.0-84866706029 (Scopus ID)978-364232927-2 (ISBN)
Conference
8th International Conference on Security and Cryptography for Networks, SCN 2012, 5 September 2012 through 7 September 2012, Amalfi
Funder
ICT - The Next Generation
Note

QC 20121120

Available from: 2012-11-20 Created: 2012-11-20 Last updated: 2024-03-18Bibliographically approved
Terelius, B. & Wikström, D. (2010). Proofs of Restricted Shuffles. In: Bernstein DJ; Lange T (Ed.), PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2010. Paper presented at 3rd International Conference on Cryptology in Africa (pp. 100-113). , 6055
Open this publication in new window or tab >>Proofs of Restricted Shuffles
2010 (English)In: PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2010 / [ed] Bernstein DJ; Lange T, 2010, Vol. 6055, p. 100-113Conference paper, Published paper (Refereed)
Abstract [en]

A proof of a shuffle is a zero-knowledge proof that one list of ciphertexts is a permutation and re-encryption of another list of ciphertexts. We call a shuffle restricted if the permutation is chosen from a public subset of all permutations. In this paper, we introduce a general technique for constructing proofs of shuffles which restrict the permutation to a group that is characterized by a public polynomial. This generalizes previous work by Reiter and Wang [22], and de Hoogh et al. [7]. Our approach also gives a new efficient proof of an unrestricted shuffle that we think is conceptually simpler and allow a simpler analysis than all previous proofs of shuffles.

Series
Lecture Notes in Computer Science, ISSN 0302-9743 ; 6055
Keywords
cryptographic protocols, election schemes, mix-nets, proof of a shuffle
National Category
Computer Sciences
Identifiers
urn:nbn:se:kth:diva-29680 (URN)10.1007/978-3-642-12678-9_7 (DOI)000279247600007 ()2-s2.0-77953515197 (Scopus ID)978-3-642-12677-2 (ISBN)
Conference
3rd International Conference on Cryptology in Africa
Note
QC 20110218Available from: 2011-02-18 Created: 2011-02-11 Last updated: 2024-03-18Bibliographically approved
Organisations

Search in DiVA

Show all publications