Public protection of software

  • Authors:
  • Amir Herzberg;Shlomit S. Pinter

  • Affiliations:
  • Technion-Israel Institute of Technology, Haifa, Israel;Technion-Israel Institute of Technology, Haifa, Israel

  • Venue:
  • ACM Transactions on Computer Systems (TOCS)
  • Year:
  • 1987

Quantified Score

Hi-index 0.02

Visualization

Abstract

One of the overwhelming problems that software producers must contend with is the unauthorized use and distribution of their products. Copyright laws concerning software are rarely enforced, thereby causing major losses to the software companies. Technical means of protecting software from illegal duplication are required, but the available means are imperfect. We present protocols that enable software protection, without causing substantial overhead in distribution and maintenance. The protocols may be implemented by a conventional cryptosystem, such as the DES, or by a public key cryptosystem, such as the RSA. Both implementations are proved to satisfy required security criteria.