Limits on the security of coin flips when half the processors are faulty
STOC '86 Proceedings of the eighteenth annual ACM symposium on Theory of computing
Minimum disclosure proofs of knowledge
Journal of Computer and System Sciences - 27th IEEE Conference on Foundations of Computer Science October 27-29, 1986
Journal of the ACM (JACM)
A fast normal random number generator
ACM Transactions on Mathematical Software (TOMS)
Asymmetric fingerprinting for larger collusions
Proceedings of the 4th ACM conference on Computer and communications security
Computer Generation of Random Variables Using the Ratio of Uniform Deviates
ACM Transactions on Mathematical Software (TOMS)
Computer methods for sampling from the exponential and normal distributions
Communications of the ACM
Digital watermarking
Foundations of Cryptography: Basic Tools
Foundations of Cryptography: Basic Tools
Cryptographically Strong Undeniable Signatures, Unconditionally Secure for the Signer
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Statistical Zero Knowledge Protocols to Prove Modular Polynomial Relations
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
A Statistically-Hiding Integer Commitment Scheme Based on Groups with Hidden Order
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
A Secure, Robust Watermark for Multimedia
Proceedings of the First International Workshop on Information Hiding
Zero Knowledge Watermark Detection
IH '99 Proceedings of the Third International Workshop on Information Hiding
Proving Ownership of Digital Content
IH '99 Proceedings of the Third International Workshop on Information Hiding
An Asymmetric Public Detection Watermarking Technique
IH '99 Proceedings of the Third International Workshop on Information Hiding
Zero-Knowledge Watermark Detection and Proof of Ownership
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Proving in zero-knowledge that a number is the product of two safe primes
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Efficient proofs that a committed number lies in an interval
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
An implementation of, and attacks on, zero-knowledge watermarking
IH'04 Proceedings of the 6th international conference on Information Hiding
IEEE Journal on Selected Areas in Communications
Robust non-interactive zero-knowledge watermarking scheme against cheating prover
MM&Sec '05 Proceedings of the 7th workshop on Multimedia and security
Towards multilateral secure digital rights distribution infrastructures
Proceedings of the 5th ACM workshop on Digital rights management
Watermarking and ownership problem: a revisit
Proceedings of the 5th ACM workshop on Digital rights management
Zero-knowledge watermark detector robust to sensitivity attacks
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
Efficient zero-knowledge watermark detection with improved robustness to sensitivity attacks
EURASIP Journal on Information Security
IWDW '07 Proceedings of the 6th International Workshop on Digital Watermarking
Watermarking security: a survey
Transactions on Data Hiding and Multimedia Security I
A Comparative Survey on Cryptology-Based Methodologies
International Journal of Information Security and Privacy
Secure public verification of IP marks in FPGA design through a zero-knowledge protocol
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
Hi-index | 0.00 |
Standard watermarking schemes suffer from a major problem: They require to reveal security critical information to potentially untrusted parties, when proving the presence of a watermark to these parties. Zero-knowledge watermark detection is a promising means to overcome this problem and to improve the security of digital watermarking schemes in the context of various applications: it allows to cryptographically conceal the information required for the detection of a watermark and to prove the presence of the hidden watermark by efficient zero-knowledge proof systems.However, concealing the watermark prevents the verifying party from performing additional checks on the watermark, e.g., on its probability distribution, which may be required for certain applications. This is a limitation in the use of zero-knowledge watermark detection and we present several strategies to overcome this issue.Furthermore, we propose concrete and practical protocols, which pursue two promising strategies: the first strategy is to prove in zero-knowledge that a concealed watermark suffices a certain desired distribution, whereas the second strategy is to interactively and verifiably generate watermarks that suffice the desired distribution.