CryptoDB
Composability in Watermarking Schemes
Authors: |
|
---|---|
Download: | |
Presentation: | Slides |
Conference: | TCC 2024 |
Abstract: | Software watermarking allows for embedding a mark into a piece of code, such that any attempt to remove the mark will render the code useless. Provably secure watermarking schemes currently seems limited to programs computing various cryptographic operations, such as evaluating pseudorandom functions (PRFs), signing messages, or decrypting ciphertexts (the latter often going by the name ``traitor tracing''). Moreover, each of these watermarking schemes has an ad-hoc construction of its own. We observe, however, that many cryptographic objects are used as building blocks in larger protocols. We ask: just as we can compose building blocks to obtain larger protocols, can we compose watermarking schemes for the building blocks to obtain watermarking schemes for the larger protocols? We give an affirmative answer to this question, by precisely formulating a set of requirements that allow for composing watermarking schemes. We use our formulation to derive a number of applications. |
BibTeX
@inproceedings{tcc-2024-34782, title={Composability in Watermarking Schemes}, publisher={Springer-Verlag}, author={Jiahui Liu and Mark Zhandry}, year=2024 }