Watermarking public‐key cryptographic functionalities and implementations: The case of encryption and signatures. (10th April 2021)
- Record Type:
- Journal Article
- Title:
- Watermarking public‐key cryptographic functionalities and implementations: The case of encryption and signatures. (10th April 2021)
- Main Title:
- Watermarking public‐key cryptographic functionalities and implementations: The case of encryption and signatures
- Authors:
- Baldimtsi, Foteini
Kiayias, Aggelos
Samari, Katerina - Abstract:
- Abstract: A watermarking scheme for a public‐key cryptographic functionality enables the embedding of a mark in the instance of the secret‐key algorithm such that the functionality of the original scheme is maintained, while it is infeasible for an adversary to remove the mark (unremovability) or mark a fresh object without the marking key (unforgeability). A number of works have appeared in the literature proposing different definitional frameworks and schemes secure under a wide range of assumptions. In the previous work [1, 2], the authors proposed a meaningful relaxation of the watermarking model and gave constructions that allow direct watermarking of popular cryptographic schemes (e.g. ElGamal Encryption). A definitional framework for watermarking public‐key cryptographic functionalities and implementations which covers both deterministic (e.g. decryption) and probabilistic (e.g. signing) secret‐key algorithms is provided. The authors' work unifies the previous results of [1, 2] where deterministic and probabilistic circuits to be watermarked as separate cases are considered. The constructions of [1, 2] were previously presented as extended abstracts missing rigorous security proofs. The authors prove those constructions secure under their new, unified framework. In the authors' schemes secret detection of the watermark is provided, and security under minimal hardness assumptions assuming only the existence of one‐way functions, is proved.
- Is Part Of:
- IET information security. Volume 15:Number 3(2021)
- Journal:
- IET information security
- Issue:
- Volume 15:Number 3(2021)
- Issue Display:
- Volume 15, Issue 3 (2021)
- Year:
- 2021
- Volume:
- 15
- Issue:
- 3
- Issue Sort Value:
- 2021-0015-0003-0000
- Page Start:
- 205
- Page End:
- 222
- Publication Date:
- 2021-04-10
- Subjects:
- Computer security -- Periodicals
Cryptography -- Periodicals
Computer networks -- Security measures -- Periodicals
Database security -- Periodicals
005.8 - Journal URLs:
- https://ietresearch.onlinelibrary.wiley.com/journal/17518717 ↗
http://digital-library.theiet.org/content/journals/iet-ifs ↗
http://www.ietdl.org/IET-IFS ↗
http://www.theiet.org/ ↗ - DOI:
- 10.1049/ise2.12013 ↗
- Languages:
- English
- ISSNs:
- 1751-8709
- Deposit Type:
- Legaldeposit
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library DSC - 4363.252660
British Library DSC - BLDSS-3PM
British Library HMNTS - ELD Digital store - Ingest File:
- 16369.xml