File Download
Supplementary
-
Citations:
- Appears in Collections:
postgraduate thesis: Watermarking schemes for PRFs and public-key primitives
Title | Watermarking schemes for PRFs and public-key primitives |
---|---|
Authors | |
Advisors | |
Issue Date | 2021 |
Publisher | The University of Hong Kong (Pokfulam, Hong Kong) |
Citation | Zhao, Y. [趙艷敏]. (2021). Watermarking schemes for PRFs and public-key primitives. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR. |
Abstract | Watermarking is used to confirm the ownership of a program and authenticate softwares. Watermarking a program is to embed a “mark” or a message into the program satisfying that (i) the watermarked program is almost identical to the original program (“functionality-preserving”); (ii) it is hard to remove the “mark” unless the watermarked program is damaged heavily
(“unremovability”); (iii) it is infeasible to forge a watermarked scheme which behaves differently from other watermarked programs (“unforgeability”).
In this thesis, four watermarking schemes for different cryptographic primitives are proposed. The first one is to watermark signatures. The constructed signature can be watermarked securely in the symmetric-key setting with constraints hidden. Moreover, the signature is not required to prove secure under a certain specific proof technique. The second one is to watermark attribute-based encryptions (ABEs). Due to the difficulties of making extraction or marking algorithms public, the watermarkable ABE in the thesis is valuable with a public extraction. The novelty is a combination of a relaxed watermarking definition and a special cryptographic component called identity-based encryptions (IBE). This leads to a watermarking scheme for ABEs which possesses resistance to fully collusion attacks, secret marking and public extraction. Another advantage is that the security proof is much concise. The third one is to watermark distributed pseudorandom functions (DPRFs). Technically, a translucent constrained DPRF (TDF) is constructed under standard lattice assumption. Following the same spirit as Kim et al., a watermarking scheme for TDFs is constructed and proven that the watermarking scheme satisfies both the properties of unremovability and unforgeability. Such a watermarking scheme for DPRFs can be applied to watermark a distributed MAC scheme, a distributed symmetric-key encryption scheme, and so on. The fourth one is a watermarking scheme for PRFs in a secret-key setting under standard assumptions. A novel property of the scheme is about supporting hierarchical watermarking which is discussed for the first time. |
Degree | Doctor of Philosophy |
Subject | Digital watermarking |
Dept/Program | Computer Science |
Persistent Identifier | http://hdl.handle.net/10722/313676 |
DC Field | Value | Language |
---|---|---|
dc.contributor.advisor | Yiu, SM | - |
dc.contributor.advisor | Chow, KP | - |
dc.contributor.author | Zhao, Yanmin | - |
dc.contributor.author | 趙艷敏 | - |
dc.date.accessioned | 2022-06-26T09:32:29Z | - |
dc.date.available | 2022-06-26T09:32:29Z | - |
dc.date.issued | 2021 | - |
dc.identifier.citation | Zhao, Y. [趙艷敏]. (2021). Watermarking schemes for PRFs and public-key primitives. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR. | - |
dc.identifier.uri | http://hdl.handle.net/10722/313676 | - |
dc.description.abstract | Watermarking is used to confirm the ownership of a program and authenticate softwares. Watermarking a program is to embed a “mark” or a message into the program satisfying that (i) the watermarked program is almost identical to the original program (“functionality-preserving”); (ii) it is hard to remove the “mark” unless the watermarked program is damaged heavily (“unremovability”); (iii) it is infeasible to forge a watermarked scheme which behaves differently from other watermarked programs (“unforgeability”). In this thesis, four watermarking schemes for different cryptographic primitives are proposed. The first one is to watermark signatures. The constructed signature can be watermarked securely in the symmetric-key setting with constraints hidden. Moreover, the signature is not required to prove secure under a certain specific proof technique. The second one is to watermark attribute-based encryptions (ABEs). Due to the difficulties of making extraction or marking algorithms public, the watermarkable ABE in the thesis is valuable with a public extraction. The novelty is a combination of a relaxed watermarking definition and a special cryptographic component called identity-based encryptions (IBE). This leads to a watermarking scheme for ABEs which possesses resistance to fully collusion attacks, secret marking and public extraction. Another advantage is that the security proof is much concise. The third one is to watermark distributed pseudorandom functions (DPRFs). Technically, a translucent constrained DPRF (TDF) is constructed under standard lattice assumption. Following the same spirit as Kim et al., a watermarking scheme for TDFs is constructed and proven that the watermarking scheme satisfies both the properties of unremovability and unforgeability. Such a watermarking scheme for DPRFs can be applied to watermark a distributed MAC scheme, a distributed symmetric-key encryption scheme, and so on. The fourth one is a watermarking scheme for PRFs in a secret-key setting under standard assumptions. A novel property of the scheme is about supporting hierarchical watermarking which is discussed for the first time. | - |
dc.language | eng | - |
dc.publisher | The University of Hong Kong (Pokfulam, Hong Kong) | - |
dc.relation.ispartof | HKU Theses Online (HKUTO) | - |
dc.rights | The author retains all proprietary rights, (such as patent rights) and the right to use in future works. | - |
dc.rights | This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License. | - |
dc.subject.lcsh | Digital watermarking | - |
dc.title | Watermarking schemes for PRFs and public-key primitives | - |
dc.type | PG_Thesis | - |
dc.description.thesisname | Doctor of Philosophy | - |
dc.description.thesislevel | Doctoral | - |
dc.description.thesisdiscipline | Computer Science | - |
dc.description.nature | published_or_final_version | - |
dc.date.hkucongregation | 2022 | - |
dc.identifier.mmsid | 991044545292803414 | - |