Abstract
One of the overwhelming problems that software producers must contend with, is the unauthorized use and distribution of their products. Copyright laws concerning software are rarely enforced, thereby causing major losses to the software companies. Technical means of protecting software from illegal duplication are required, but the available means are imperfect. We present protocols that enables software protection, without causing overhead in distribution and maintenance. The protocols may be implemented by a conventional cryptosystem, such as the DES, or by a public key cryptosystem, such as the RSA. Both implementations are proved to satisfy required security criterions.
Original language | English |
---|---|
Title of host publication | Advances in Cryptology — CRYPTO 1985 - Proceedings |
Editors | Hugh C. Williams |
Publisher | Springer Verlag |
Pages | 158-179 |
Number of pages | 22 |
ISBN (Print) | 9783540164630 |
DOIs | |
State | Published - 1986 |
Externally published | Yes |
Event | 5th Annual International Cryptology Conference, CRYPTO 1985 - Santa Barbara, United States Duration: 18 Aug 1985 → 22 Aug 1985 |
Publication series
Name | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
---|---|
Volume | 218 LNCS |
ISSN (Print) | 0302-9743 |
ISSN (Electronic) | 1611-3349 |
Conference
Conference | 5th Annual International Cryptology Conference, CRYPTO 1985 |
---|---|
Country/Territory | United States |
City | Santa Barbara |
Period | 18/08/85 → 22/08/85 |
Bibliographical note
Publisher Copyright:© 1986, Springer-Verlag Berlin Heidelberg.