@article{(International Science Index):http://iastem.com/publications/10011335,
  author    = {Yanmin Zhao and  Siu Ming Yiu},
  email	    = {ymzhao@cs.hku.hk}  ,
  title     = {A Watermarking Signature Scheme with Hidden Watermarks and Constraint Functions in the Symmetric Key Setting},
  country   = {},
  institution={},
  abstract     = {To claim the ownership for an executable program is a non-trivial task. An emerging direction is to add a watermark to the program such that the watermarked program preserves the original program’s functionality and removing the watermark would heavily destroy the functionality of the watermarked program. In this paper, the first watermarking signature scheme with the watermark and the constraint function hidden in the symmetric key setting is constructed. The scheme uses well-known techniques of lattice trapdoors and a lattice evaluation. The watermarking signature scheme is unforgeable under the Short Integer Solution (SIS) assumption and satisfies other security requirements such as the unremovability security property.
},
    journal   = {International Journal of Computer, Electrical, Automation, Control and Information Engineering},  volume    = {14},
  number    = {7},
  year      = {2020},
  pages     = {35 - 42},
  ee        = {http://iastem.com/publications/10011335},
  url   	= {http://iastem.com/Publications?p=163},
  bibsource = {http://iastem.com/Publications},
  issn  	= {1307-6892},
  publisher = {International Science Index},
  index 	= {International Science Index 163, Computer and Information Engineering, 2020},
}