Abstract

Confidential computing hosted watermarking applies and later verifies recipient-bound watermarks on a structured dataset entirely inside a trusted execution environment or a multi-party data clean room, so that the producer's source data is not exposed to the verifier and the verifier's signals are not exposed to the producer. The enclave receives the source dataset, the recipient identity, and the watermark policy, produces a recipient-bound watermarked variant whose carriers are visible only to the enclave, and later, given a suspected derivative, evaluates whether the derivative carries signals consistent with any registered recipient, all without decrypting the source dataset outside the enclave.

Creative Commons License

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.

Share

COinS