How to watermark cryptographic functions

17Citations
Citations of this article
42Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

We propose a scheme for watermarking cryptographic functions. Informally speaking, a digital watermarking scheme for cryptographic functions embeds information, called a mark, into functions such as (trapdoor) one-way functions and decryption functions of public-key encryption. It is required that a mark-embedded function is functionally equivalent to the original function and it is difficult for adversaries to remove the embedded mark without damaging the function. In spite of its importance and usefulness, there have only been a few theoretical studies on watermarking for functions (or program), and we do not have rigorous and meaningful definitions of watermarking for cryptographic functions and concrete constructions. To solve the above problem, we introduce a notion of watermarking for cryptographic functions and define its security. We present a lossy trapdoor function (LTF) based on the decisional linear (DLIN) problem and a watermarking scheme for the LTF. Our watermarking scheme is secure under the DLIN assumption in the standard model. We use the techniques of dual system encryption and dual pairing vector spaces (DPVS) to construct our watermarking scheme. This is a new application of DPVS. © 2013 International Association for Cryptologic Research.

References Powered by Scopus

Identity-based encryption from the weil pairing

1932Citations
N/AReaders
Get full text

Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption

1099Citations
N/AReaders
Get full text

Dual system encryption: Realizing fully secure IBE and HIBE under simple assumptions

797Citations
N/AReaders
Get full text

Cited by Powered by Scopus

Watermarking cryptographic capabilities

61Citations
N/AReaders
Get full text

Watermarking cryptographic functionalities from standard lattice assumptions

29Citations
N/AReaders
Get full text

Watermarking cryptographic capabilities

24Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Nishimaki, R. (2013). How to watermark cryptographic functions. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7881 LNCS, pp. 111–125). https://doi.org/10.1007/978-3-642-38348-9_7

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 26

74%

Researcher 4

11%

Professor / Associate Prof. 3

9%

Lecturer / Post doc 2

6%

Readers' Discipline

Tooltip

Computer Science 27

75%

Mathematics 4

11%

Engineering 3

8%

Physics and Astronomy 2

6%

Save time finding and organizing research with Mendeley

Sign up for free