{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,5,9]],"date-time":"2024-05-09T00:14:01Z","timestamp":1715213641870},"reference-count":18,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"9","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Fundamentals"],"published-print":{"date-parts":[[2021,9,1]]},"DOI":"10.1587\/transfun.2020dmp0022","type":"journal-article","created":{"date-parts":[[2021,3,18]],"date-time":"2021-03-18T22:07:17Z","timestamp":1616105237000},"page":"1255-1270","source":"Crossref","is-referenced-by-count":0,"title":["Watermarkable Signature with Computational Function Preserving"],"prefix":"10.1587","volume":"E104.A","author":[{"given":"Kyohei","family":"SUDO","sequence":"first","affiliation":[{"name":"Tokyo Institute of Technology"}]},{"given":"Keisuke","family":"HARA","sequence":"additional","affiliation":[{"name":"Tokyo Institute of Technology"},{"name":"National Institute of Advanced Industrial Science and Technology (AIST)"}]},{"given":"Masayuki","family":"TEZUKA","sequence":"additional","affiliation":[{"name":"Tokyo Institute of Technology"}]},{"given":"Yusuke","family":"YOSHIDA","sequence":"additional","affiliation":[{"name":"Tokyo Institute of Technology"}]},{"given":"Keisuke","family":"TANAKA","sequence":"additional","affiliation":[{"name":"Tokyo Institute of Technology"}]}],"member":"532","reference":[{"key":"1","doi-asserted-by":"crossref","unstructured":"[1] F. Baldimtsi, A. Kiayias, and K. Samari, \u201cWatermarking public-key cryptographic functionalities and implementations,\u201d ISC 2017, pp.173-191, 2017. 10.1007\/978-3-319-69659-1_10","DOI":"10.1007\/978-3-319-69659-1_10"},{"key":"2","doi-asserted-by":"crossref","unstructured":"[2] B. Barak, O. Goldreich, R. Impagliazzo, S. Rudich, A. Sahai, S.P. Vadhan, and K. Yang, \u201cOn the (im)possibility of obfuscating programs,\u201d CRYPTO 2001, pp.1-18, 2001. 10.1007\/3-540-44647-8_1","DOI":"10.1007\/3-540-44647-8_1"},{"key":"3","doi-asserted-by":"publisher","unstructured":"[3] B. Barak, O. Goldreich, R. Impagliazzo, S. Rudich, A. Sahai, S.P. Vadhan, and K. Yang, \u201cOn the (im)possibility of obfuscating programs,\u201d J. ACM, vol.59, no.2, pp.6:1-6:48, 2012. 10.1145\/2160158.2160159","DOI":"10.1145\/2160158.2160159"},{"key":"4","doi-asserted-by":"crossref","unstructured":"[4] D. Boneh, K. Lewi, and D.J. Wu, \u201cConstraining pseudorandom functions privately,\u201d PKC 2017, Part II, pp.494-524, 2017. 10.1007\/978-3-662-54388-7_17","DOI":"10.1007\/978-3-662-54388-7_17"},{"key":"5","doi-asserted-by":"crossref","unstructured":"[6] A. Cohen, J. Holmgren, R. Nishimaki, V. Vaikuntanathan, and D. Wichs, \u201cWatermarking cryptographic capabilities,\u201d ACM, STOC 2016, pp.1115-1127, 2016. 10.1145\/2897518.2897651","DOI":"10.1145\/2897518.2897651"},{"key":"6","unstructured":"[7] A. Cohen, J. Holmgren, and V. Vaikuntanathan, \u201cPublicly verifiable software watermarking,\u201d IACR Cryptology ePrint Archive, 2015:373, 2015."},{"key":"7","doi-asserted-by":"crossref","unstructured":"[8] R. Goyal, S. Kim, N. Manohar, B. Waters, and D.J. Wu, \u201cWatermarking public-key cryptographic primitives,\u201d CRYPTO 2019, Part III, pp.367-398, 2019. 10.1007\/978-3-030-26954-8_12","DOI":"10.1007\/978-3-030-26954-8_12"},{"key":"8","doi-asserted-by":"crossref","unstructured":"[10] S. Kim and D.J. Wu, \u201cWatermarking cryptographic functionalities from standard lattice assumptions,\u201d CRYPTO 2017, Part I, pp.503-536, 2017. 10.1007\/978-3-319-63688-7_17","DOI":"10.1007\/978-3-319-63688-7_17"},{"key":"9","doi-asserted-by":"crossref","unstructured":"[11] S. Kim and D.J. Wu, \u201cWatermarking PRFs from lattices: Stronger security via extractable PRFs,\u201d CRYPTO 2019, Part III, pp.335-366, 2019. 10.1007\/978-3-030-26954-8_11","DOI":"10.1007\/978-3-030-26954-8_11"},{"key":"10","doi-asserted-by":"crossref","unstructured":"[12] D. Naccache, A. Shamir, and J.P. Stern, \u201cHow to copyright a function?,\u201d PKC&apos;99, pp.188-196, 1999. 10.1007\/3-540-49162-7_14","DOI":"10.1007\/3-540-49162-7_14"},{"key":"11","doi-asserted-by":"publisher","unstructured":"[13] R. Nishimaki, \u201cHow to watermark cryptographic functions,\u201d EUROCRYPT 2013, pp.111-125, 2013. 10.1007\/978-3-642-38348-9_7","DOI":"10.1007\/978-3-642-38348-9_7"},{"key":"12","doi-asserted-by":"publisher","unstructured":"[14] R. Nishimaki, \u201cHow to watermark cryptographic functions by bilinear maps,\u201d IEICE Trans. Fundamentals, vol.E102-A, no.1, pp.99-113, Jan. 2019. 10.1587\/transfun.e102.a.99","DOI":"10.1587\/transfun.E102.A.99"},{"key":"13","doi-asserted-by":"crossref","unstructured":"[15] R. Nishimaki, \u201cEquipping public-key cryptographic primitives with watermarking (or: A hole is to watermark),\u201d TCC 2020, Part I, pp.179-209, 2020. 10.1007\/978-3-030-64375-1_7","DOI":"10.1007\/978-3-030-64375-1_7"},{"key":"14","unstructured":"[16] R. Nishimaki and D. Wichs, \u201cWatermarking cryptographic programs against arbitrary removal strategies,\u201d IACR Cryptology ePrint Archive, 2015:344, 2015."},{"key":"15","doi-asserted-by":"crossref","unstructured":"[17] W. Quach, D. Wichs, and G. Zirdelis, \u201cWatermarking PRFs under standard assumptions: Public marking and security with extraction queries,\u201d TCC 2018, Part II, pp.669-698, 2018. 10.1007\/978-3-030-03810-6_24","DOI":"10.1007\/978-3-030-03810-6_24"},{"key":"16","doi-asserted-by":"crossref","unstructured":"[18] R. Yang, M.H. Au, J. Lai, Q. Xu, and Z. Yu, \u201cUnforgeable watermarking schemes with public extraction,\u201d SCN 2018, pp.63-80, 2018. 10.1007\/978-3-319-98113-0_4","DOI":"10.1007\/978-3-319-98113-0_4"},{"key":"17","doi-asserted-by":"crossref","unstructured":"[19] R. Yang, M.H. Au, J. Lai, Q. Xu, and Z. Yu, \u201cCollusion resistant watermarking schemes for cryptographic functionalities,\u201d ASIACRYPT 2019, Part I, pp.371-398, 2019. 10.1007\/978-3-030-34578-5_14","DOI":"10.1007\/978-3-030-34578-5_14"},{"key":"18","doi-asserted-by":"crossref","unstructured":"[20] R. Yang, M.H. Au, Z. Yu, and Q. Xu, \u201cCollusion resistant watermarkable PRFs from standard assumptions,\u201d CRYPTO 2020, Part I, pp.590-620, 2020. 10.1007\/978-3-030-56784-2_20","DOI":"10.1007\/978-3-030-56784-2_20"}],"container-title":["IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transfun\/E104.A\/9\/E104.A_2020DMP0022\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,8]],"date-time":"2024-05-08T04:39:55Z","timestamp":1715143195000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transfun\/E104.A\/9\/E104.A_2020DMP0022\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,1]]},"references-count":18,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2021]]}},"URL":"https:\/\/doi.org\/10.1587\/transfun.2020dmp0022","relation":{},"ISSN":["0916-8508","1745-1337"],"issn-type":[{"value":"0916-8508","type":"print"},{"value":"1745-1337","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,9,1]]},"article-number":"2020DMP0022"}}