{"id":"https://openalex.org/W7130459973","doi":"https://doi.org/10.48550/arxiv.2602.15323","title":"Unforgeable Watermarks for Language Models via Robust Signatures","display_name":"Unforgeable Watermarks for Language Models via Robust Signatures","publication_year":2026,"publication_date":"2026-02-17","ids":{"openalex":"https://openalex.org/W7130459973","doi":"https://doi.org/10.48550/arxiv.2602.15323"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2602.15323","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2602.15323","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2602.15323","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5112276639","display_name":"Huijia Lin","orcid":"https://orcid.org/0000-0003-2206-4817"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Lin, Huijia","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026444125","display_name":"Kameron Shahabi","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Shahabi, Kameron","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5037509689","display_name":"Min Jae Song","orcid":"https://orcid.org/0000-0002-3033-906X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Song, Min Jae","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5112276639"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.32089999318122864,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.32089999318122864,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10775","display_name":"Generative Adversarial Networks and Image Synthesis","score":0.08950000256299973,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14347","display_name":"Big Data and Digital Economy","score":0.04010000079870224,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.7860000133514404},{"id":"https://openalex.org/keywords/watermark","display_name":"Watermark","score":0.6801000237464905},{"id":"https://openalex.org/keywords/soundness","display_name":"Soundness","score":0.6793000102043152},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5006999969482422},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.47200000286102295},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4691999852657318},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4514000117778778},{"id":"https://openalex.org/keywords/language-model","display_name":"Language model","score":0.4438999891281128},{"id":"https://openalex.org/keywords/construct","display_name":"Construct (python library)","score":0.4250999987125397}],"concepts":[{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.7860000133514404},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7228999733924866},{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.6801000237464905},{"id":"https://openalex.org/C39920170","wikidata":"https://www.wikidata.org/wiki/Q693083","display_name":"Soundness","level":2,"score":0.6793000102043152},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5006999969482422},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.47200000286102295},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4691999852657318},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.46230000257492065},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4514000117778778},{"id":"https://openalex.org/C137293760","wikidata":"https://www.wikidata.org/wiki/Q3621696","display_name":"Language model","level":2,"score":0.4438999891281128},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.4250999987125397},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.4226999878883362},{"id":"https://openalex.org/C193319292","wikidata":"https://www.wikidata.org/wiki/Q272172","display_name":"Hamming distance","level":2,"score":0.4108999967575073},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.39719998836517334},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.3815999925136566},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3612000048160553},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.35359999537467957},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.34599998593330383},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.32429999113082886},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.3149000108242035},{"id":"https://openalex.org/C2780581891","wikidata":"https://www.wikidata.org/wiki/Q15738686","display_name":"Copy protection","level":4,"score":0.31450000405311584},{"id":"https://openalex.org/C2779344036","wikidata":"https://www.wikidata.org/wiki/Q11320476","display_name":"Digital content","level":2,"score":0.30570000410079956},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.2903999984264374},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.28360000252723694},{"id":"https://openalex.org/C101454708","wikidata":"https://www.wikidata.org/wiki/Q17106019","display_name":"Standard Model (mathematical formulation)","level":3,"score":0.26989999413490295},{"id":"https://openalex.org/C2779530757","wikidata":"https://www.wikidata.org/wiki/Q1207505","display_name":"Quality (philosophy)","level":2,"score":0.26179999113082886},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.2597000002861023}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2602.15323","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2602.15323","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2602.15323","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2602.15323","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/4","display_name":"Quality Education","score":0.6318116784095764}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Language":[0],"models":[1],"now":[2],"routinely":[3],"produce":[4],"text":[5,107],"that":[6,74,142,177,188,198],"is":[7,100,143,161],"difficult":[8],"to":[9,20,125,150,180,207],"distinguish":[10],"from":[11,69,77,80,108,191],"human":[12],"writing,":[13],"raising":[14],"the":[15,54,81,102,105,110,137],"need":[16],"for":[17],"robust":[18,41,167,209],"tools":[19],"verify":[21],"content":[22,112,119,123],"provenance.":[23],"Watermarking":[24],"has":[25],"emerged":[26],"as":[27,88],"a":[28,98,162,208],"promising":[29],"countermeasure,":[30],"with":[31,148],"existing":[32],"work":[33],"largely":[34],"focused":[35],"on":[36],"model":[37,83],"quality":[38],"preservation":[39],"and":[40,64,132,146,217],"detection.":[42],"However,":[43],"current":[44],"schemes":[45],"provide":[46],"limited":[47],"protection":[48],"against":[49],"false":[50,71],"attribution.":[51],"We":[52,135,196],"strengthen":[53,118],"notion":[55],"of":[56,95,175,186],"soundness":[57],"by":[58,121],"introducing":[59],"two":[60],"novel":[61],"guarantees:":[62],"unforgeability":[63],"recoverability.":[65],"Unforgeability":[66],"prevents":[67],"adversaries":[68],"crafting":[70],"positives,":[72],"texts":[73],"are":[75,85,178,189],"far":[76,190],"any":[78,199],"output":[79],"watermarked":[82],"but":[84],"nonetheless":[86],"flagged":[87,111],"watermarked.":[89],"Recoverability":[90],"provides":[91],"an":[92],"additional":[93],"layer":[94],"protection:":[96],"whenever":[97],"watermark":[99],"detected,":[101],"detector":[103],"identifies":[104],"source":[106],"which":[109,172],"was":[113],"derived.":[114],"Together,":[115],"these":[116],"properties":[117],"ownership":[120],"linking":[122],"exclusively":[124],"its":[126],"generating":[127],"model,":[128],"enabling":[129],"secure":[130],"attribution":[131],"fine-grained":[133],"traceability.":[134],"construct":[136],"first":[138],"undetectable":[139],"watermarking":[140],"scheme":[141,203],"robust,":[144],"unforgeable,":[145],"recoverable":[147],"respect":[149],"substitutions":[151],"(i.e.,":[152],"perturbations":[153],"in":[154],"Hamming":[155],"metric).":[156],"The":[157],"key":[158],"technical":[159],"ingredient":[160],"new":[163],"cryptographic":[164],"primitive":[165],"called":[166],"(or":[168],"recoverable)":[169],"digital":[170,201],"signatures,":[171],"allow":[173],"verification":[174],"messages":[176,187],"close":[179],"signed":[181,194],"ones,":[182],"while":[183],"preventing":[184],"forgery":[185],"all":[192],"previously":[193],"messages.":[195],"show":[197],"standard":[200],"signature":[202],"can":[204],"be":[205],"boosted":[206],"one":[210],"using":[211],"property-preserving":[212],"hash":[213],"functions":[214],"(Boyle,":[215],"LaVigne,":[216],"Vaikuntanathan,":[218],"ITCS":[219],"2019).":[220]},"counts_by_year":[],"updated_date":"2026-02-19T06:31:58.851227","created_date":"2026-02-19T00:00:00"}
