Nothing Special   »   [go: up one dir, main page]

skip to main content
10.5555/648116.746587guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

How to Copyright a Function?

Published: 01 March 1999 Publication History

Abstract

This paper introduces a method for tracking different copies of functionally equivalent algorithms containing identification marks known to the attacker. Unlike all previous solutions, the new technique does not rely on any marking assumption and leads to a situation where each copy is either traceable or so severely damaged that it becomes impossible to store in polynomial space or run in polynomial time.
Although RSA-related, the construction is particularly applicable to confidential block-ciphers such as SkipJack, RC4, GOST 28147-89, GSM A5, COMP128, TIA CAVE or other proprietary executables distributed to potentially distrusted users.

References

[1]
J.-M. Acken, How watermarking adds value to digital content, Communications of the ACM, vol. 41-7, pp. 75-77, 1998.
[2]
P. Bas, J.-M. Chassery and F. Davoine, Self-similarity based image watermarking, Proceedings of eusipco'98, Ninth European signal processing conference, European association for signal processing, pp. 2277-2280.
[3]
The huge costs of software piracy, Computer Fraud and Security Bulletin, 09/1997, Elsevier Science, page 3.
[4]
D. Boneh and J. Shaw, Collusion-secure fingerprinting for digital data, Advances in cryptology crypto'95, Springer-Verlag, Lectures notes in computer science 963, pp. 452-465, 1995.
[5]
B. Chor, A. Fiat and M. Naor, Tracing traitors, Advances in cryptology crypto'94, Springer-Verlag, Lectures notes in computer science 839, pp. 257-270, 1994.
[6]
G. Miller, Riemann's hypothesis and tests for primality, Journal of computer and system sciences, vol. 13, pp. 300-317, 1976.
[7]
D. Naccache and J. Stern, A new public-key cryptosystem, Advances in cryptology eurocrypt'97, Springer-Verlag, Lectures notes in computer science 1233, pp. 27- 36, 1997.
[8]
M. Naor and B. Pinkas, Theshold Traitor Tracing, Advances in cryptology crypto'98, Springer-Verlag, Lectures notes in computer science 1462, pp. 502- 517, 1998.
[9]
V. Ostrovsky, The other side of deception, Harper-Collins Publishers, New-York, page 38, 1995.
[10]
B. Pfitzmann and M. Schunter, Asymmetric fingerprinting, Advances in cryptology eurocrypt'96, Springer-Verlag, Lectures notes in computer science 1070, pp. 84- 95, 1996.
[11]
B. Pfitzmann and M. Waidner, Anonymous fingerprinting, Advances in cryptology eurocrypt'97, Springer-Verlag, Lectures notes in computer science 1233, pp. 88- 102, 1997.
[12]
R. Rivest, A. Shamir and L. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, vol. 21-2, pp. 120-126, 1978.
[13]
J. Rompel, One way functions are necessary and sufficient for secure digital signatures , Proceedings of the 22-nd Annual ACM Symposium on the Theory of Computing, pp. 387-394, 1990.
[14]
K. Verco and M. Wise, Plagiarism à la mode: a comparison of automated systems for detecting suspected plagiarism, The Computer Journal, vol. 39-9, pp. 741-750, 1996.

Cited By

View all
  • (2016)Watermarking cryptographic capabilitiesProceedings of the forty-eighth annual ACM symposium on Theory of Computing10.1145/2897518.2897651(1115-1127)Online publication date: 19-Jun-2016
  • (2013)How to keep a secretProceedings of the 2013 ACM SIGSAC conference on Computer & communications security10.1145/2508859.2516691(943-954)Online publication date: 4-Nov-2013
  • (2012)On the (im)possibility of obfuscating programsJournal of the ACM (JACM)10.1145/2160158.216015959:2(1-48)Online publication date: 3-May-2012
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
PKC '99: Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography
March 1999
326 pages
ISBN:3540656448

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 01 March 1999

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 20 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2016)Watermarking cryptographic capabilitiesProceedings of the forty-eighth annual ACM symposium on Theory of Computing10.1145/2897518.2897651(1115-1127)Online publication date: 19-Jun-2016
  • (2013)How to keep a secretProceedings of the 2013 ACM SIGSAC conference on Computer & communications security10.1145/2508859.2516691(943-954)Online publication date: 4-Nov-2013
  • (2012)On the (im)possibility of obfuscating programsJournal of the ACM (JACM)10.1145/2160158.216015959:2(1-48)Online publication date: 3-May-2012
  • (2012)Message-Based traitor tracing with optimal ciphertext rateProceedings of the 2nd international conference on Cryptology and Information Security in Latin America10.1007/978-3-642-33481-8_4(56-77)Online publication date: 7-Oct-2012
  • (2009)Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private KeysProceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC '0910.1007/978-3-642-00468-1_14(235-255)Online publication date: 12-Mar-2009
  • (2006)Hiding circuit topology from unbounded reverse engineersProceedings of the 11th Australasian conference on Information Security and Privacy10.1007/11780656_15(171-182)Online publication date: 3-Jul-2006

View Options

View options

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media