Watermarking public‐key cryptographic functionalities and implementations: The case of encryption and signatures
Abstract A watermarking scheme for a public‐key cryptographic functionality enables the embedding of a mark in the instance of the secret‐key algorithm such that the functionality of the original scheme is maintained, while it is infeasible for an adversary to remove the mark (unremovability) or mar...
Saved in:
| Main Authors: | Foteini Baldimtsi, Aggelos Kiayias, Katerina Samari |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Wiley
2021-05-01
|
| Series: | IET Information Security |
| Subjects: | |
| Online Access: | https://doi.org/10.1049/ise2.12013 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Efficient lattice‐based authenticated key exchange based on key encapsulation mechanism and signature
by: Guanhao Xue, et al.
Published: (2021-01-01) -
Efficient implementation of post-quantum digital signatures on Raspberry Pi
by: Mahmood A. Al-Shareeda, et al.
Published: (2025-06-01) -
Simulation of Shor Algorithm for Discrete Logarithm Problems With Comprehensive Pairs of Modulo <inline-formula><tex-math notation="LaTeX">$p$</tex-math></inline-formula> and Order <inline-formula><tex-math notation="LaTeX">$q$</tex-math></inline-formula>
by: Kaito Kishi, et al.
Published: (2025-01-01) -
Advantages of Logarithmic Signatures in the Implementation of Crypto Primitives
by: Yevhen Kotukh, et al.
Published: (2024-06-01) -
Security notions for stateful signature schemes
by: Quan Yuan, et al.
Published: (2022-01-01)