Watermarking public‐key cryptographic functionalities and implementations: The case of encryption and signatures
Abstract A watermarking scheme for a public‐key cryptographic functionality enables the embedding of a mark in the instance of the secret‐key algorithm such that the functionality of the original scheme is maintained, while it is infeasible for an adversary to remove the mark (unremovability) or mar...
Saved in:
| Main Authors: | , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Wiley
2021-05-01
|
| Series: | IET Information Security |
| Subjects: | |
| Online Access: | https://doi.org/10.1049/ise2.12013 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1849414020896915456 |
|---|---|
| author | Foteini Baldimtsi Aggelos Kiayias Katerina Samari |
| author_facet | Foteini Baldimtsi Aggelos Kiayias Katerina Samari |
| author_sort | Foteini Baldimtsi |
| collection | DOAJ |
| description | Abstract A watermarking scheme for a public‐key cryptographic functionality enables the embedding of a mark in the instance of the secret‐key algorithm such that the functionality of the original scheme is maintained, while it is infeasible for an adversary to remove the mark (unremovability) or mark a fresh object without the marking key (unforgeability). A number of works have appeared in the literature proposing different definitional frameworks and schemes secure under a wide range of assumptions. In the previous work [1, 2], the authors proposed a meaningful relaxation of the watermarking model and gave constructions that allow direct watermarking of popular cryptographic schemes (e.g. ElGamal Encryption). A definitional framework for watermarking public‐key cryptographic functionalities and implementations which covers both deterministic (e.g. decryption) and probabilistic (e.g. signing) secret‐key algorithms is provided. The authors’ work unifies the previous results of [1, 2] where deterministic and probabilistic circuits to be watermarked as separate cases are considered. The constructions of [1, 2] were previously presented as extended abstracts missing rigorous security proofs. The authors prove those constructions secure under their new, unified framework. In the authors’ schemes secret detection of the watermark is provided, and security under minimal hardness assumptions assuming only the existence of one‐way functions, is proved. |
| format | Article |
| id | doaj-art-7100fb7cdec7447f90a05c6e3a73ff99 |
| institution | Kabale University |
| issn | 1751-8709 1751-8717 |
| language | English |
| publishDate | 2021-05-01 |
| publisher | Wiley |
| record_format | Article |
| series | IET Information Security |
| spelling | doaj-art-7100fb7cdec7447f90a05c6e3a73ff992025-08-20T03:33:57ZengWileyIET Information Security1751-87091751-87172021-05-0115320522210.1049/ise2.12013Watermarking public‐key cryptographic functionalities and implementations: The case of encryption and signaturesFoteini Baldimtsi0Aggelos Kiayias1Katerina Samari2Computer Science Department George Mason University Fairfax USAUniversity of Edinburgh and IOHK Edinburgh UKDepartment of Informatics and Telecommunications National and Kapodistrian University of Athens GreeceAbstract A watermarking scheme for a public‐key cryptographic functionality enables the embedding of a mark in the instance of the secret‐key algorithm such that the functionality of the original scheme is maintained, while it is infeasible for an adversary to remove the mark (unremovability) or mark a fresh object without the marking key (unforgeability). A number of works have appeared in the literature proposing different definitional frameworks and schemes secure under a wide range of assumptions. In the previous work [1, 2], the authors proposed a meaningful relaxation of the watermarking model and gave constructions that allow direct watermarking of popular cryptographic schemes (e.g. ElGamal Encryption). A definitional framework for watermarking public‐key cryptographic functionalities and implementations which covers both deterministic (e.g. decryption) and probabilistic (e.g. signing) secret‐key algorithms is provided. The authors’ work unifies the previous results of [1, 2] where deterministic and probabilistic circuits to be watermarked as separate cases are considered. The constructions of [1, 2] were previously presented as extended abstracts missing rigorous security proofs. The authors prove those constructions secure under their new, unified framework. In the authors’ schemes secret detection of the watermark is provided, and security under minimal hardness assumptions assuming only the existence of one‐way functions, is proved.https://doi.org/10.1049/ise2.12013digital signaturespublic key cryptography |
| spellingShingle | Foteini Baldimtsi Aggelos Kiayias Katerina Samari Watermarking public‐key cryptographic functionalities and implementations: The case of encryption and signatures IET Information Security digital signatures public key cryptography |
| title | Watermarking public‐key cryptographic functionalities and implementations: The case of encryption and signatures |
| title_full | Watermarking public‐key cryptographic functionalities and implementations: The case of encryption and signatures |
| title_fullStr | Watermarking public‐key cryptographic functionalities and implementations: The case of encryption and signatures |
| title_full_unstemmed | Watermarking public‐key cryptographic functionalities and implementations: The case of encryption and signatures |
| title_short | Watermarking public‐key cryptographic functionalities and implementations: The case of encryption and signatures |
| title_sort | watermarking public key cryptographic functionalities and implementations the case of encryption and signatures |
| topic | digital signatures public key cryptography |
| url | https://doi.org/10.1049/ise2.12013 |
| work_keys_str_mv | AT foteinibaldimtsi watermarkingpublickeycryptographicfunctionalitiesandimplementationsthecaseofencryptionandsignatures AT aggeloskiayias watermarkingpublickeycryptographicfunctionalitiesandimplementationsthecaseofencryptionandsignatures AT katerinasamari watermarkingpublickeycryptographicfunctionalitiesandimplementationsthecaseofencryptionandsignatures |