Collusion-Secure Fingerprinting for Digital Data
Boneh, Dan, and James Shaw
IEEE Transactions on Information Theory 44, no. 5 (1998): 1897-1905
https://doi.org/10.1109/18.705568
“Fingerprinting is an old cryptographic technique. Several hundred years ago logarithm tables were protected by fingerprinting them. The idea was to introduce tiny errors in the insignificant digits (i.e., tenth digit right of the decimal point) of log x for a few random values of x. A different set of x’s was chosen for each copy of the logarithm table. If an owner of a logarithm table ever sold illegal copies of it, the tiny errors in the table enabled the “police” to trace an illegal copy back to its owner. The owner would then be prosecuted and penalized in some way. ”
Bellare, Mihir, and Phillip Rogaway
Proceedings of the 1st ACM Conference on Computer and Communications Security (1993): 62-73
Boneh, Dan, and James Shaw
IEEE Transactions on Information Theory 44, no. 5 (1998): 1897-1905
Richards, Blake A., Timothy Lillicrap, et al.
Nature Neuroscience 22, no. 11 (2019): 1761-1770.
Wickham, Hadley
Journal of statistical software 59 (2014): 1-23.
LeCun, Yann, Yoshua Bengio, and Geoffrey Hinton
Nature 521, no. 7553 (2015): 436-444.
Bennett, Charles H., Gilles Brassard, and N. David Mermin
Physical Review Letters 68, no. 5 (1992): 557
Minsky, Marvin
Communications of the ACM 43, no. 8 (2000): 66-73
Turing, Alan
Proceedings of the London mathematical society 2, no. 1 (1937): 230-265
Lloyd, Seth
Nature 406, no. 6799 (2000): 1047-1054
Knuth, Donald E.
The Computer Journal 27, no. 2 (1984): 97-111
Brooks, Frederick P.
IEEE Computer 20, no. 4 (1987): 10-19
Lamport, Leslie, Robert Shostak, and Marshall Pease
ACM Transactions on Programming Languages and Systems (TOPLAS) 4, no. 3 (1982): 382–401
Lindley, Sam, Philip Wadler, and Jeremy Yallop
Journal of Functional Programming 20, no. 1 (2010): 51-69
Wadler, Philip
ACM SIGPLAN Notices 47, no. 9 (2012): 273-286
Boneh, Dan, and Matt Franklin
Annual International Cryptology Conference (2001), Berlin, Heidelberg: Springer Berlin Heidelberg: pp. 213-229