Equipping Public-Key Cryptographic Primitives with Watermarking (or: A Hole Is to Watermark).
Ryo NishimakiPublished in: TCC (1) (2020)
Keyphrases
- public key
- image authentication
- digital signature
- public key cryptography
- elliptic curve cryptography
- digital watermark
- digital watermarking
- watermarking scheme
- watermarking technique
- secure communication
- encryption scheme
- copyright protection
- watermarking algorithm
- watermarking method
- public key encryption
- digital images
- security analysis
- spread spectrum
- image watermarking
- security model
- watermark detection
- watermark embedding
- private key
- image processing operations
- signature scheme
- secret key
- jpeg compression
- data hiding
- homomorphic encryption
- key management
- security properties
- public key infrastructure
- authentication scheme
- error correction
- secret sharing scheme
- secret message
- proxy re encryption
- security protocols
- smart card
- signal processing
- ad hoc networks
- multimedia content
- provably secure
- hash functions
- authentication protocol
- standard model