Paper 2024/1662
Composability in Watermarking Schemes
Abstract
Software watermarking allows for embedding a mark into a piece of code, such that any attempt to remove the mark will render the code useless. Provably secure watermarking schemes currently seems limited to programs computing various cryptographic operations, such as evaluating pseudorandom functions (PRFs), signing messages, or decrypting ciphertexts (the latter often going by the name ``traitor tracing''). Moreover, each of these watermarking schemes has an ad-hoc construction of its own. We observe, however, that many cryptographic objects are used as building blocks in larger protocols. We ask: just as we can compose building blocks to obtain larger protocols, can we compose watermarking schemes for the building blocks to obtain watermarking schemes for the larger protocols? We give an affirmative answer to this question, by precisely formulating a set of requirements that allow for composing watermarking schemes. We use our formulation to derive a number of applications.
Metadata
- Available format(s)
- Category
- Foundations
- Publication info
- A minor revision of an IACR publication in TCC 2024
- Keywords
- watermarkingadvanced encryption
- Contact author(s)
-
jiahuiliu crypto @ gmail com
mark zhandry @ ntt-research com - History
- 2024-10-18: approved
- 2024-10-14: received
- See all versions
- Short URL
- https://ia.cr/2024/1662
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2024/1662, author = {Jiahui Liu and Mark Zhandry}, title = {Composability in Watermarking Schemes}, howpublished = {Cryptology {ePrint} Archive, Paper 2024/1662}, year = {2024}, url = {https://eprint.iacr.org/2024/1662} }