Watermarking public-key cryptographic primitives
From MaRDI portal
Publication:2304925
DOI10.1007/978-3-030-26954-8_12OpenAlexW2969059461MaRDI QIDQ2304925
Publication date: 9 March 2020
Full work available at URL: https://doi.org/10.1007/978-3-030-26954-8_12
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62) Theory of software (68N99)
Related Items (14)
New approaches for quantum copy-protection ⋮ Watermarking PRFs against quantum adversaries ⋮ Traceable PRFs: Full Collusion Resistance and Active Security ⋮ Collusion resistant copy-protection for watermarkable functionalities ⋮ Watermarkable public key encryption with efficient extraction under standard assumptions ⋮ Collusion-resistant functional encryption for RAMs ⋮ Public key encryption with secure key leasing ⋮ Anamorphic signatures: secrecy from a dictator who only permits authentication! ⋮ Beyond software watermarking: traitor-tracing for pseudorandom functions ⋮ Public-key watermarking schemes for pseudorandom functions ⋮ Collusion resistant trace-and-revoke for arbitrary identities from standard assumptions ⋮ Secure software leasing from standard assumptions ⋮ Watermarking cryptographic functionalities from standard lattice assumptions ⋮ Collusion resistant watermarkable PRFs from standard assumptions
This page was built for publication: Watermarking public-key cryptographic primitives