Watermarking public‐key cryptographic functionalities and implementations: The case of encryption and signatures

Abstract A watermarking scheme for a public‐key cryptographic functionality enables the embedding of a mark in the instance of the secret‐key algorithm such that the functionality of the original scheme is maintained, while it is infeasible for an adversary to remove the mark (unremovability) or mar...

Full description

Saved in:
Bibliographic Details
Main Authors: Foteini Baldimtsi, Aggelos Kiayias, Katerina Samari
Format: Article
Language:English
Published: Wiley 2021-05-01
Series:IET Information Security
Subjects:
Online Access:https://doi.org/10.1049/ise2.12013
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1849414020896915456
author Foteini Baldimtsi
Aggelos Kiayias
Katerina Samari
author_facet Foteini Baldimtsi
Aggelos Kiayias
Katerina Samari
author_sort Foteini Baldimtsi
collection DOAJ
description Abstract A watermarking scheme for a public‐key cryptographic functionality enables the embedding of a mark in the instance of the secret‐key algorithm such that the functionality of the original scheme is maintained, while it is infeasible for an adversary to remove the mark (unremovability) or mark a fresh object without the marking key (unforgeability). A number of works have appeared in the literature proposing different definitional frameworks and schemes secure under a wide range of assumptions. In the previous work [1, 2], the authors proposed a meaningful relaxation of the watermarking model and gave constructions that allow direct watermarking of popular cryptographic schemes (e.g. ElGamal Encryption). A definitional framework for watermarking public‐key cryptographic functionalities and implementations which covers both deterministic (e.g. decryption) and probabilistic (e.g. signing) secret‐key algorithms is provided. The authors’ work unifies the previous results of [1, 2] where deterministic and probabilistic circuits to be watermarked as separate cases are considered. The constructions of [1, 2] were previously presented as extended abstracts missing rigorous security proofs. The authors prove those constructions secure under their new, unified framework. In the authors’ schemes secret detection of the watermark is provided, and security under minimal hardness assumptions assuming only the existence of one‐way functions, is proved.
format Article
id doaj-art-7100fb7cdec7447f90a05c6e3a73ff99
institution Kabale University
issn 1751-8709
1751-8717
language English
publishDate 2021-05-01
publisher Wiley
record_format Article
series IET Information Security
spelling doaj-art-7100fb7cdec7447f90a05c6e3a73ff992025-08-20T03:33:57ZengWileyIET Information Security1751-87091751-87172021-05-0115320522210.1049/ise2.12013Watermarking public‐key cryptographic functionalities and implementations: The case of encryption and signaturesFoteini Baldimtsi0Aggelos Kiayias1Katerina Samari2Computer Science Department George Mason University Fairfax USAUniversity of Edinburgh and IOHK Edinburgh UKDepartment of Informatics and Telecommunications National and Kapodistrian University of Athens GreeceAbstract A watermarking scheme for a public‐key cryptographic functionality enables the embedding of a mark in the instance of the secret‐key algorithm such that the functionality of the original scheme is maintained, while it is infeasible for an adversary to remove the mark (unremovability) or mark a fresh object without the marking key (unforgeability). A number of works have appeared in the literature proposing different definitional frameworks and schemes secure under a wide range of assumptions. In the previous work [1, 2], the authors proposed a meaningful relaxation of the watermarking model and gave constructions that allow direct watermarking of popular cryptographic schemes (e.g. ElGamal Encryption). A definitional framework for watermarking public‐key cryptographic functionalities and implementations which covers both deterministic (e.g. decryption) and probabilistic (e.g. signing) secret‐key algorithms is provided. The authors’ work unifies the previous results of [1, 2] where deterministic and probabilistic circuits to be watermarked as separate cases are considered. The constructions of [1, 2] were previously presented as extended abstracts missing rigorous security proofs. The authors prove those constructions secure under their new, unified framework. In the authors’ schemes secret detection of the watermark is provided, and security under minimal hardness assumptions assuming only the existence of one‐way functions, is proved.https://doi.org/10.1049/ise2.12013digital signaturespublic key cryptography
spellingShingle Foteini Baldimtsi
Aggelos Kiayias
Katerina Samari
Watermarking public‐key cryptographic functionalities and implementations: The case of encryption and signatures
IET Information Security
digital signatures
public key cryptography
title Watermarking public‐key cryptographic functionalities and implementations: The case of encryption and signatures
title_full Watermarking public‐key cryptographic functionalities and implementations: The case of encryption and signatures
title_fullStr Watermarking public‐key cryptographic functionalities and implementations: The case of encryption and signatures
title_full_unstemmed Watermarking public‐key cryptographic functionalities and implementations: The case of encryption and signatures
title_short Watermarking public‐key cryptographic functionalities and implementations: The case of encryption and signatures
title_sort watermarking public key cryptographic functionalities and implementations the case of encryption and signatures
topic digital signatures
public key cryptography
url https://doi.org/10.1049/ise2.12013
work_keys_str_mv AT foteinibaldimtsi watermarkingpublickeycryptographicfunctionalitiesandimplementationsthecaseofencryptionandsignatures
AT aggeloskiayias watermarkingpublickeycryptographicfunctionalitiesandimplementationsthecaseofencryptionandsignatures
AT katerinasamari watermarkingpublickeycryptographicfunctionalitiesandimplementationsthecaseofencryptionandsignatures