Public protection of software
- 1 October 1987
- journal article
- Published by Association for Computing Machinery (ACM) in ACM Transactions on Computer Systems
- Vol. 5 (4), 371-393
- https://doi.org/10.1145/29868.29872
Abstract
One of the overwhelming problems that software producers must contend with is the unauthorized use and distribution of their products. Copyright laws concerning software are rarely enforced, thereby causing major losses to the software companies. Technical means of protecting software from illegal duplication are required, but the available means are imperfect. We present protocols that enable software protection, without causing substantial overhead in distribution and maintenance. The protocols may be implemented by a conventional cryptosystem, such as the DES, or by a public key cryptosystem, such as the RSA. Both implementations are proved to satisfy required security criteria.Keywords
This publication has 5 references indexed in Scilit:
- How to (Selectively) Broadcast A SecretPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1985
- Combatting Software Piracy by Encryption and Key ManagementComputer, 1984
- On the security of ping-pong protocolsInformation and Control, 1982
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978
- New directions in cryptographyIEEE Transactions on Information Theory, 1976