leakage identification for secret relational data using shadowed watermarks
文献类型:会议论文
作者 | Xian Hequn ; Feng Dengguo |
出版日期 | 2009 |
会议名称 | International Conference on Communication Software and Networks |
会议日期 | FEB 27-28, |
会议地点 | Macau, PEOPLES R CHINA |
关键词 | Computer software Public key cryptography |
英文摘要 | various database watermarking techniques have been developed to protect the ownership of relational data, some provide extra utilities for pirate identification. In all the proposed schemes, the data owner controls the watermark key and the watermark generation process, which makes it possible for the owner to falsely accuse an innocent user of pirating. In this paper, we propose a novel watermark scheme to solve the problem of leakage identification for secret relational data, which is a small-scaled pirate identification problem. We devise a scheme that combines two keys to generate a shadowed watermark, and we design a protocol to bind the data distribution to the identities of both the owner and the user. A user is able to prove his innocence if falsely accused, so that both parties are fairly protected. We provide probabilistic analyses for the effectiveness and security of our scheme, and we test its performance to conclude that the scheme is qualified for practical use. |
会议主办者 | Int Assoc Comp Sci & Informat Technol, Sichuan Comp Federat, Singapore Inst Elect |
会议录 | Proceedings of the 2009 International Conference on Communication Software and Networks, ICCSN 2009
![]() |
会议录出版者 | PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS |
会议录出版地 | 10662 LOS VAQUEROS CIRCLE, PO BOX 3014, LOS ALAMITOS, CA 90720-1264 USA |
ISBN号 | 978-0-7695-3522-7 |
源URL | [http://124.16.136.157/handle/311060/8314] ![]() |
专题 | 软件研究所_信息安全国家重点实验室_会议论文 |
推荐引用方式 GB/T 7714 | Xian Hequn,Feng Dengguo. leakage identification for secret relational data using shadowed watermarks[C]. 见:International Conference on Communication Software and Networks. Macau, PEOPLES R CHINA. FEB 27-28,. |
入库方式: OAI收割
来源:软件研究所
浏览0
下载0
收藏0
其他版本
除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。