Watermarking public-key cryptographic functionalities and implementations: The case of encryption and signatures

[1]  Claus-Peter Schnorr,et al.  Efficient signature generation by smart cards , 2004, Journal of Cryptology.

[2]  Brent Waters,et al.  Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys , 2006, EUROCRYPT.

[3]  Brent Waters,et al.  Constrained Pseudorandom Functions and Their Applications , 2013, ASIACRYPT.

[4]  Dan Boneh,et al.  Constraining Pseudorandom Functions Privately , 2015, Public Key Cryptography.

[5]  Aggelos Kiayias,et al.  Scalable public-key tracing and revoking , 2003, PODC '03.

[6]  Mark Zhandry,et al.  Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation , 2014, CRYPTO.

[7]  David J. Wu,et al.  Watermarking PRFs from Lattices: Stronger Security via Extractable PRFs , 2019, IACR Cryptol. ePrint Arch..

[8]  Amos Fiat,et al.  Tracing traitors , 2000, IEEE Trans. Inf. Theory.

[9]  Amit Sahai,et al.  On the (im)possibility of obfuscating programs , 2001, JACM.

[10]  Brent Waters,et al.  A fully collusion resistant broadcast, trace, and revoke system , 2006, CCS '06.

[11]  Shafi Goldwasser,et al.  Functional Signatures and Pseudorandom Functions , 2014, Public Key Cryptography.

[12]  Taher El Gamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.

[13]  Aggelos Kiayias,et al.  Delegatable pseudorandom functions and applications , 2013, IACR Cryptol. ePrint Arch..

[14]  Brent Waters,et al.  How to use indistinguishability obfuscation: deniable encryption, and more , 2014, IACR Cryptol. ePrint Arch..

[15]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[16]  Rafail Ostrovsky,et al.  Invariant Signatures and Non-Interactive Zero-Knowledge Proofs are Equivalent (Extended Abstract) , 1992, CRYPTO.

[17]  Aggelos Kiayias,et al.  Traitor Tracing with Constant Transmission Rate , 2002, EUROCRYPT.

[18]  Brent Waters,et al.  Lossy trapdoor functions and their applications , 2008, SIAM J. Comput..

[19]  Aggelos Kiayias,et al.  How to keep a secret: leakage deterring public-key cryptosystems , 2013, CCS.

[20]  David Naccache,et al.  How to Copyright a Function? , 1999, Public Key Cryptography.

[21]  Daniel Wichs,et al.  Watermarking PRFs under Standard Assumptions: Public Marking and Security with Extraction Queries , 2018, IACR Cryptol. ePrint Arch..

[22]  Edward J. Delp,et al.  Digital watermarking: algorithms and applications , 2001, IEEE Signal Process. Mag..

[23]  Anna Lysyanskaya,et al.  Unique Signatures and Verifiable Random Functions from the DH-DDH Separation , 2002, CRYPTO.

[24]  David A. Wagner,et al.  From Weak to Strong Watermarking , 2007, TCC.

[25]  Man Ho Au,et al.  Unforgeable Watermarking Schemes with Public Extraction , 2018, SCN.

[26]  Man Ho Au,et al.  Collusion Resistant Watermarking Schemes for Cryptographic Functionalities , 2017, IACR Cryptol. ePrint Arch..

[27]  Ryo Nishimaki,et al.  How to Watermark Cryptographic Functions , 2013, IACR Cryptol. ePrint Arch..

[28]  Ryo Nishimaki,et al.  Watermarking Cryptographic Programs Against Arbitrary Removal Strategies , 2015, IACR Cryptol. ePrint Arch..

[29]  Brent Waters,et al.  Watermarking Public-Key Cryptographic Primitives , 2019, IACR Cryptol. ePrint Arch..

[30]  Man Ho Au,et al.  Collusion Resistant Watermarkable PRFs from Standard Assumptions , 2020, IACR Cryptol. ePrint Arch..

[31]  Stefan Katzenbeisser,et al.  Watermarking schemes provably secure against copy and ambiguity attacks , 2003, DRM '03.

[32]  Aggelos Kiayias,et al.  Watermarking Public-Key Cryptographic Functionalities and Implementations , 2017, ISC.

[33]  David J. Wu,et al.  Watermarking Cryptographic Functionalities from Standard Lattice Assumptions , 2017, CRYPTO.

[34]  Rajeev Kumar Singh,et al.  A Survey: Digital Image Watermarking Techniques , 2014 .