implements Copy Protection
This protocol achieves the functionality of Copy Protection allowing a Vendor to send a program to a Client such that the Client cannot duplicate it.
Any Copy Protection protocol consists of two algorithms: Protect and Eval. For the family of compute-and-compare programs, these algorithms are described as follows:
No content has been added to this section, yet!
PF-Protect($\\\lambda, y$)
Inputs: $\\\lambda$ – security parameter; $y$ – description of point function $P_y$.
PF-Eval($\\\lambda, (\\\rho, z), x$)
Inputs: $\\\lambda$ – security parameter; $(\\\rho, z)$ – Alleged copy-protected program; $x$ – Input on which the program is to be evaluated.
No content has been added to this section, yet!
For the security proof and extension of the protocol to other functionalities, refer to the paper by Coladangelo et al. (2020) [1].
implements Copy Protection
This protocol achieves the functionality of Copy Protection allowing a Vendor to send a program to a Client such that the Client cannot duplicate it.
Any Copy Protection protocol consists of two algorithms: Protect and Eval. For the family of compute-and-compare programs, these algorithms are described as follows:
No content has been added to this section, yet!
PF-Protect($\\\lambda, y$)
Inputs: $\\\lambda$ – security parameter; $y$ – description of point function $P_y$.
PF-Eval($\\\lambda, (\\\rho, z), x$)
Inputs: $\\\lambda$ – security parameter; $(\\\rho, z)$ – Alleged copy-protected program; $x$ – Input on which the program is to be evaluated.
No content has been added to this section, yet!
For the security proof and extension of the protocol to other functionalities, refer to the paper by Coladangelo et al. (2020) [1].
implements Copy Protection
This protocol achieves the functionality of Copy Protection allowing a Vendor to send a program to a Client such that the Client cannot duplicate it.
Any Copy Protection protocol consists of two algorithms: Protect and Eval. For the family of compute-and-compare programs, these algorithms are described as follows:
No content has been added to this section, yet!
PF-Protect($\\\lambda, y$)
Inputs: $\\\lambda$ – security parameter; $y$ – description of point function $P_y$.
PF-Eval($\\\lambda, (\\\rho, z), x$)
Inputs: $\\\lambda$ – security parameter; $(\\\rho, z)$ – Alleged copy-protected program; $x$ – Input on which the program is to be evaluated.
No content has been added to this section, yet!
For the security proof and extension of the protocol to other functionalities, refer to the paper by Coladangelo et al. (2020) [1].