International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Composability in Watermarking Schemes

Authors:
Jiahui Liu , Massachusetts Institute of Technology
Mark Zhandry , NTT Research
Download:
Search ePrint
Search Google
Conference: TCC 2024
Abstract: Software watermarking allows for embedding a mark into a piece of code, such that any attempt to remove the mark will render the code useless. Provably secure watermarking schemes currently seems limited to programs computing various cryptographic operations, such as evaluating pseudorandom functions (PRFs), signing messages, or decrypting ciphertexts (the latter often going by the name ``traitor tracing''). Moreover, each of these watermarking schemes has an ad-hoc construction of its own. We observe, however, that many cryptographic objects are used as building blocks in larger protocols. We ask: just as we can compose building blocks to obtain larger protocols, can we compose watermarking schemes for the building blocks to obtain watermarking schemes for the larger protocols? We give an affirmative answer to this question, by precisely formulating a set of requirements that allow for composing watermarking schemes. We use our formulation to derive a number of applications.
BibTeX
@inproceedings{tcc-2024-34782,
  title={Composability in Watermarking Schemes},
  publisher={Springer-Verlag},
  author={Jiahui Liu and Mark Zhandry},
  year=2024
}