Abstract
Confidential computing hosted watermarking applies and later verifies recipient-bound watermarks on a structured dataset entirely inside a trusted execution environment or a multi-party data clean room, so that the producer's source data is not exposed to the verifier and the verifier's signals are not exposed to the producer. The enclave receives the source dataset, the recipient identity, and the watermark policy, produces a recipient-bound watermarked variant whose carriers are visible only to the enclave, and later, given a suspected derivative, evaluates whether the derivative carries signals consistent with any registered recipient, all without decrypting the source dataset outside the enclave.
Creative Commons License

This work is licensed under a Creative Commons Attribution 4.0 License.
Recommended Citation
Burton, Aaron, "Confidential Computing Hosted Watermarking and Verification of Structured Datasets", Technical Disclosure Commons, ()
https://www.tdcommons.org/dpubs_series/10023