Watermarking public‐key cryptographic functionalities and implementations: The case of encryption and signatures
Abstract A watermarking scheme for a public‐key cryptographic functionality enables the embedding of a mark in the instance of the secret‐key algorithm such that the functionality of the original scheme is maintained, while it is infeasible for an adversary to remove the mark (unremovability) or mar...
Main Authors: | Foteini Baldimtsi, Aggelos Kiayias, Katerina Samari |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2021-05-01
|
Series: | IET Information Security |
Online Access: | https://doi.org/10.1049/ise2.12013 |
Similar Items
-
Cryptoraptor : high throughput reconfigurable cryptographic processor for symmetric key encryption and cryptographic hash functions
by: Sayilar, Gokhan
Published: (2015) -
Watermarking Cryptographic Capabilities
by: Cohen, Aloni (Aloni Jonathan), et al.
Published: (2020) -
Public Watermarking System based on Wavelet Transform with Cryptographic and Self-Correcting Watermark
by: Ko-Ming Chan, et al.
Published: (2001) -
Post quantum proxy signature scheme based on the multivariate public key cryptographic signature
by: Jiahui Chen, et al.
Published: (2020-04-01) -
FPGA Implementation of RSA Public-Key Cryptographic Coprocessor
by: Hani, Mohamed Khalil, et al.
Published: (2000)