Paper 2024/1662

Composability in Watermarking Schemes

Jiahui Liu, Massachusetts Institute of Technology
Mark Zhandry, NTT Research
Abstract

Software watermarking allows for embedding a mark into a piece of code, such that any attempt to remove the mark will render the code useless. Provably secure watermarking schemes currently seems limited to programs computing various cryptographic operations, such as evaluating pseudorandom functions (PRFs), signing messages, or decrypting ciphertexts (the latter often going by the name ``traitor tracing''). Moreover, each of these watermarking schemes has an ad-hoc construction of its own. We observe, however, that many cryptographic objects are used as building blocks in larger protocols. We ask: just as we can compose building blocks to obtain larger protocols, can we compose watermarking schemes for the building blocks to obtain watermarking schemes for the larger protocols? We give an affirmative answer to this question, by precisely formulating a set of requirements that allow for composing watermarking schemes. We use our formulation to derive a number of applications.

Metadata
Available format(s)
PDF
Category
Foundations
Publication info
A minor revision of an IACR publication in TCC 2024
Keywords
watermarkingadvanced encryption
Contact author(s)
jiahuiliu crypto @ gmail com
mark zhandry @ ntt-research com
History
2024-10-18: approved
2024-10-14: received
See all versions
Short URL
https://ia.cr/2024/1662
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2024/1662,
      author = {Jiahui Liu and Mark Zhandry},
      title = {Composability in Watermarking Schemes},
      howpublished = {Cryptology {ePrint} Archive, Paper 2024/1662},
      year = {2024},
      url = {https://eprint.iacr.org/2024/1662}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.