Please use this identifier to cite or link to this item:
http://hdl.handle.net/10397/99885
| DC Field | Value | Language |
|---|---|---|
| dc.contributor | Department of Computing | en_US |
| dc.creator | Yang, R | en_US |
| dc.creator | Yu, Z | en_US |
| dc.creator | Au, MH | en_US |
| dc.creator | Susilo, W | en_US |
| dc.date.accessioned | 2023-07-24T08:55:53Z | - |
| dc.date.available | 2023-07-24T08:55:53Z | - |
| dc.identifier.uri | http://hdl.handle.net/10397/99885 | - |
| dc.description | Crypto 2022 is a hybrid conference and will take place in Santa Barbara, USA on August 13-18 2022. Crypto 2022 is organized by the International Association for Cryptologic Research (IACR). | en_US |
| dc.language.iso | en | en_US |
| dc.publisher | Cryptology ePrint Archive | en_US |
| dc.rights | The following publication Yang, R., Yu, Z., Au, M. H., & Susilo, W. (2022, August). Public-Key Watermarking Schemes for Pseudorandom Functions. In Annual International Cryptology Conference (Crypto 2022), Santa Barbara, USA, August 13-18 2022, paper 2022/768 is available at https://eprint.iacr.org/2022/768 which is licensed under the CC BY (https://creativecommons.org/licenses/by/4.0/). | en_US |
| dc.title | Public-key watermarking schemes for pseudorandom functions | en_US |
| dc.type | Conference Paper | en_US |
| dcterms.abstract | A software watermarking scheme can embed a message into a program while preserving its functionality. The embedded message can be extracted later by an extraction algorithm, and no one could remove it without significantly changing the functionality of the program. A watermarking scheme is public key if neither the marking procedure nor the extraction procedure needs a watermarking secret key. Prior constructions of watermarking schemes mainly focus on watermarking pseudorandom functions (PRFs), and the major open problem in this direction is to construct a public-key watermarkable PRF. | en_US |
| dcterms.abstract | In this work, we solve the open problem via constructing public-key watermarkable PRFs with different trade-offs from various assumptions, ranging from standard lattice assumptions to the existence of indistinguishability obfuscation. To achieve the results, we first construct watermarking schemes in a weaker model, where the extraction algorithm is provided with a “hint” about the watermarked PRF key. Then we upgrade the constructions to standard watermarking schemes using a robust unobfuscatable PRF. We also provide the first construction of robust unobfuscatable PRF in this work, which is of independent interest. | en_US |
| dcterms.accessRights | open access | en_US |
| dcterms.bibliographicCitation | In Crypto 2022, Santa Barbara, USA, August 13-18 2022, paper 2022/768 | en_US |
| dcterms.issued | 2022 | - |
| dc.relation.conference | Annual International Cryptology Conference [Crypto] | en_US |
| dc.description.validate | 202307 bcwh | en_US |
| dc.description.oa | Not applicable | en_US |
| dc.identifier.FolderNumber | a2297 [non PolyU] | - |
| dc.identifier.SubFormID | 47402 | - |
| dc.description.fundingSource | RGC | en_US |
| dc.description.oaCategory | CC | en_US |
| Appears in Collections: | Conference Paper | |
Page views
119
Citations as of Apr 14, 2025
Downloads
76
Citations as of Apr 14, 2025
Google ScholarTM
Check
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.


