Public Protection of Software

Amir Herzberg, Shlomit S. Pinter

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Scopus citations

Abstract

One of the overwhelming problems that software producers must contend with, is the unauthorized use and distribution of their products. Copyright laws concerning software are rarely enforced, thereby causing major losses to the software companies. Technical means of protecting software from illegal duplication are required, but the available means are imperfect. We present protocols that enables software protection, without causing overhead in distribution and maintenance. The protocols may be implemented by a conventional cryptosystem, such as the DES, or by a public key cryptosystem, such as the RSA. Both implementations are proved to satisfy required security criterions.

Original languageEnglish
Title of host publicationAdvances in Cryptology — CRYPTO 1985 - Proceedings
EditorsHugh C. Williams
PublisherSpringer Verlag
Pages158-179
Number of pages22
ISBN (Print)9783540164630
DOIs
StatePublished - 1986
Externally publishedYes
Event5th Annual International Cryptology Conference, CRYPTO 1985 - Santa Barbara, United States
Duration: 18 Aug 198522 Aug 1985

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume218 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference5th Annual International Cryptology Conference, CRYPTO 1985
Country/TerritoryUnited States
CitySanta Barbara
Period18/08/8522/08/85

Bibliographical note

Publisher Copyright:
© 1986, Springer-Verlag Berlin Heidelberg.

Fingerprint

Dive into the research topics of 'Public Protection of Software'. Together they form a unique fingerprint.

Cite this