From Weak to Strong Watermarking
From MaRDI portal
Publication:3596390
DOI10.1007/978-3-540-70936-7_20zbMath1129.94045OpenAlexW1760332327MaRDI QIDQ3596390
Nicholas J. Hopper, David Molnar, David Wagner
Publication date: 30 August 2007
Published in: Theory of Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-70936-7_20
Related Items (10)
Watermarking PRFs under standard assumptions: public marking and security with extraction queries ⋮ Watermarking Cryptographic Capabilities ⋮ Watermarking PRFs against quantum adversaries ⋮ Traceable PRFs: Full Collusion Resistance and Active Security ⋮ Anamorphic signatures: secrecy from a dictator who only permits authentication! ⋮ Beyond software watermarking: traitor-tracing for pseudorandom functions ⋮ Public-key watermarking schemes for pseudorandom functions ⋮ Constraining Pseudorandom Functions Privately ⋮ Watermarking cryptographic functionalities from standard lattice assumptions ⋮ Collusion resistant watermarkable PRFs from standard assumptions
This page was built for publication: From Weak to Strong Watermarking