Watermarking public‐key cryptographic functionalities and implementations: The case of encryption and signatures
Abstract A watermarking scheme for a public‐key cryptographic functionality enables the embedding of a mark in the instance of the secret‐key algorithm such that the functionality of the original scheme is maintained, while it is infeasible for an adversary to remove the mark (unremovability) or mar...
Saved in:
| Main Authors: | Foteini Baldimtsi, Aggelos Kiayias, Katerina Samari |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Wiley
2021-05-01
|
| Series: | IET Information Security |
| Subjects: | |
| Online Access: | https://doi.org/10.1049/ise2.12013 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Efficient lattice‐based authenticated key exchange based on key encapsulation mechanism and signature
by: Guanhao Xue, et al.
Published: (2021-01-01) -
Efficient implementation of post-quantum digital signatures on Raspberry Pi
by: Mahmood A. Al-Shareeda, et al.
Published: (2025-06-01) -
Security and Performance Analyses of Post-Quantum Digital Signature Algorithms and Their TLS and PKI Integrations
by: Manohar Raavi, et al.
Published: (2025-06-01) -
Quantum public-key encryption protocol based on single-photon
by: Wen-jun LUO, et al.
Published: (2014-11-01) -
Efficient and provably-secure certificateless sequential aggregate signature scheme
by: Zhu WANG, et al.
Published: (2022-05-01)