Copyright Infringement

Total Page:16

File Type:pdf, Size:1020Kb

Copyright Infringement COPYRIGHT INFRINGEMENT Mark Miller Jackson Walker L.L.P. 112 E. Pecan, Suite 2400 San Antonio, Texas 78205 (210) 978-7700 [email protected] This paper was first published in the State Bar of Texas Corporate Counsel Section Corporate Counsel Review, Vol. 30, No. 1 (2011) The author appreciates the State Bar’s permission to update and re-publish it. THE AUTHOR Mark Miller is a shareholder with Jackson Walker L.L.P., a Texas law firm with offices in San Antonio, Dallas, Houston, Austin, Ft. Worth, and San Angelo. He is Chair of the firm’s intellectual property section and concentrates on transactions and litigation concerning intellectual property, franchising, and antitrust. Mr. Miller received his B.A. in Chemistry from Austin College in 1974 and his J.D. from St. Mary’s University in 1978. He was an Associate Editor for St. Mary’s Law Journal; admitted to practice before the United States Patent and Trademark Office in 1978; served on the Admissions Committee for the U.S. District Court, Western District of Texas, and been selected as one of the best intellectual property lawyers in San Antonio. He is admitted to practice before the United States Supreme Court, the Federal Circuit Court of Appeals, the United States Court of Appeals for the Fifth and Tenth Circuits, the District Courts for the Western, Southern, and Northern Districts of Texas, and the Texas Supreme Court. He is a member of the American Bar Association’s Forum Committee on Franchising, and the ABA Antitrust Section’s Committee on Franchising. Mr. Miller is a frequent speaker and writer, including “Neglected Copyright Litigation Issues,” State Bar of Texas, Intellectual Property Section, Annual Meeting, 2009, “Unintentional Franchising,” 36 St. Mary’s Law Journal 2, 2005; “Landmine Poker - Malpractice Traps for Intellectual Property Attorneys,” Intellectual Property Law Course, State Bar of Texas, 2003; “Copyright Infringement and Remedies,” E-Copyright Handbook, Aspen Law, 2002; “Patents, Trade Secrets and The Success of a Small Chemical Business,” American Chemical Society, 2001; “Intellectual Property for General Attorneys,” 24th Annual Advanced Civil Trial Course, State Bar of Texas, 2001; “Copyright Infringement,” University of Houston Law Foundation, 2000, 2001 and 2006; “Franchising for the General Practitioner,” San Antonio Bar Association, 1998; “Intellectual Property Malpractice Issues for New IP Attorneys,” State Bar of Texas, Intellectual Property Section, 1998; “You Did What? - Potential Pitfalls for the Franchisor,” State Bar of Texas, Intellectual Property Section, 1996; “Protecting Corporate Trade Secrets and Other Intangible Assets,” San Antonio Bar Association 1993; “Franchise Primer,” State Bar of Texas, Intellectual Property Section, 1993; “How to Represent Prospective Franchisees Effectively,” Texas State Bar, Franchise and Distribution Committee; “The Importance of Trademarks to Franchising,” American Bar Association Forum on Franchising, 1991; “Franchising and The Business Lawyer: How to Recognize It and Deal With It,” Advanced Business Law Institute, State Bar of Texas, 1990; “Expanding Through Franchising,” Texas State Bar Franchise Institute, 1987; and “Franchising in Texas,” 14 St. Mary’s Law Journal 2, 1983. The author wishes to thank Sara Wiley Borrelli of Jackson Walker LLP for her contribution to this paper. i TABLE OF CONTENTS I. INTRODUCTION..............................................................................................................1 A. Scope. .......................................................................................................................1 B. “The Good Book” ....................................................................................................1 II. WHAT IS COPYRIGHT INFRINGEMENT? ...............................................................1 A. Statute ......................................................................................................................1 § 106 Exclusive Rights in Copyrighted Works........................................................1 § 301 Preemption With Respect to Other Laws –....................................................2 § 602 Infringing Importation. ..................................................................................2 B. What is Copyright Infringement? ............................................................................2 C. What is Not Copyright Infringement? .....................................................................5 D. Related Rights and Preemption. ...............................................................................7 III. WHO CAN SUE FOR INFRINGEMENT? ..................................................................11 A. Statute. ...................................................................................................................11 § 501 Infringement of Copyright ...........................................................................11 B. Ownership. .............................................................................................................12 C. Work for Hire. ........................................................................................................13 D. Joint and Collective Works. ...................................................................................14 IV. WHO ARE INFRINGERS? ............................................................................................17 A. Statute. ...................................................................................................................17 § 501 Infringement of Copyright ..........................................................................17 B. Direct Infringers. ....................................................................................................17 C. Indirect Infringers. .................................................................................................17 D. Criminal Infringers.................................................................................................21 V. HOW IS INFRINGEMENT PROVED? ........................................................................21 A. Statute. ...................................................................................................................21 § 501 Infringement of Copyright ...........................................................................21 B. What Work Was Registered? .................................................................................21 C. Is the Copyright Right Valid? ................................................................................22 D. Was the Registered Work Copied? ........................................................................23 VI. HOW MUCH COPYING IS TOO MUCH? .................................................................25 A. Statute. ...................................................................................................................25 § 102 Subject Matter of Copyright: In General ....................................................25 B. Is the Accused Work Substantially Similar To the Copyrighted Work? ...............25 C. Abstraction-Filtration-Comparison Test. ...............................................................26 D. Ven Diagram Example. ..........................................................................................33 E. Substantial Similarity Determination. ....................................................................35 VII. WHAT IS FAIR USE?.....................................................................................................35 A. Statute. ...................................................................................................................35 § 107 Limitations on Exclusive Rights: Fair Use .................................................35 ii B. Fair Use. .................................................................................................................36 C. § 107’s Four Factors. .............................................................................................36 D. Parody. ...................................................................................................................38 E. Fair Use Determination. .........................................................................................39 VIII. MONETARY RELIEF ....................................................................................................41 A. Statute. ...................................................................................................................41 § 412 Registration as a Prerequisite to Certain Remedies for Infringement ..........41 § 504 Remedies for Infringement: Damages and Profits. ......................................41 § 505 Remedies for Infringement: Costs and Attorney’s Fees .............................42 B. Damages and Profits. .............................................................................................42 C. Statutory Damages. ................................................................................................44 D. Election of Statutory or Actual Damages. .............................................................48 E. Attorneys Fees and Costs. ......................................................................................48 F. Who is Liable for What? ........................................................................................49 IX. INJUNCTIVE RELIEF ...................................................................................................50
Recommended publications
  • Bright Tunes Music V. Harrisongs Music
    420 F.Supp. 177 United States District Court, S. D. New York. BRIGHT TUNES MUSIC CORP., Plaintiff, v. HARRISONGS MUSIC, LTD., et al., Defendants. No. 7 1 Civ. 602. | Aug. 31, 1976. | As Amended Sept. 1, 1976. OPINION AND ORDER OWEN, District Judge. This is an action in which it is claimed that a successful song, My Sweet Lord, listing George Harrison as the composer, is plagiarized from an earlier successful song, He’s So Fine, composed by Ronald Mack, recorded by a singing group called the “Chiffons,” the copyright of which is owned by plaintiff, Bright Tunes Music Corp. He’s So Fine, recorded in 1962, is a catchy tune consisting essentially of four repetitions of a very short basic musical phrase, “sol-mi-re,” (hereinafter motif A),1 altered as necessary to fit the words, followed by four repetitions of another short basic musical phrase, “sol-la-do-la-do,” (hereinafter motif B).2 While neither motif is novel, the four repetitions of A, followed by four repetitions of B, is a highly unique pattern.3 In addition, in the second use of the motif B series, there is a grace note inserted making the phrase go “sol-la-do-la-re-do.”4 My Sweet Lord, recorded first in 1970, also uses the same motif A (modified to suit the words) four times, followed by motif B, repeated three times, not four. In place of He’s So Fine’s fourth repetition of motif B, My Sweet Lord has a transitional passage of musical attractiveness of the same approximate length, with the identical grace note in the identical second repetition.5 The harmonies of both songs are identical.6 *179 George Harrison, a former member of The Beatles, was aware of He’s So Fine.
    [Show full text]
  • Circular 1 Copyright Basics
    CIRCULAR 1 Copyright Basics Copyright is a form of protection Copyright is a form of protection provided by the laws of the provided by U.S. law to authors of United States to the authors of “original works of authorship” that are fixed in a tangible form of expression. An original “original works of authorship” from work of authorship is a work that is independently created by the time the works are created in a a human author and possesses at least some minimal degree of creativity. A work is “fixed” when it is captured (either fixed form. This circular provides an by or under the authority of an author) in a sufficiently overview of basic facts about copyright permanent medium such that the work can be perceived, and copyright registration with the reproduced, or communicated for more than a short time. Copyright protection in the United States exists automatically U.S. Copyright Office. It covers from the moment the original work of authorship is fixed.1 • Works eligible for protection • Rights of copyright owners What Works Are Protected? • Who can claim copyright • Duration of copyright Examples of copyrightable works include • Literary works • Musical works, including any accompanying words • Dramatic works, including any accompanying music • Pantomimes and choreographic works • Pictorial, graphic, and sculptural works • Motion pictures and other audiovisual works • Sound recordings, which are works that result from the fixation of a series of musical, spoken, or other sounds • Architectural works These categories should be viewed broadly for the purpose of registering your work. For example, computer programs and certain “compilations” can be registered as “literary works”; maps and technical drawings can be registered as “pictorial, graphic, and sculptural works.” w copyright.gov note: Before 1978, federal copyright was generally secured by publishing a work with an appro- priate copyright notice.
    [Show full text]
  • Day Fines in American Courts
    If you have issues viewing or accessing this file contact us at NCJRS.gov. U.S. Department of Justice Office of Justice Programs NalionallnSlilute ofJustice Day Fines in American Courts: The Staten Island and Milwaukee Experiments sa p c About the National Institute of Justice The National Institute of Justice is the research and development agency of the U.S. Department of Justice, est'~blished to prevent and redu-::e crime and to improve the criminal justice system. Specific mandates established by Congress in the Omnibus Crime Control and Safe Streets Act of 1968, as amended, and the Anti-Drug Abuse Act of 1988 direct the National Institute of Justice to: III Sponsor special projects and research·and development prugrums that will improve and strengthen lhe criminal justice system and reduce or prevent crime. III Conduct national demonstration projects that employ innovatiYe or promising approaches for improving criminal justice. III Del'e/op new technologies to fight crime and improve criminal justice. III Evaluate the effectiveness oj criminal justice programs ana identify programs that promise' to be successful if continued or repeated. .. Recommend actions that can be taken by Federal, State, and local governments as well as private organizations to improve criminal justice. III Carry out research on criminal behavior. II Develop new methods oj crime prevention and reduction of crime and delinquency. The National Institute of Justice has a long history of accomplishments, including the following: .. Basic research on career criminals that led to development of special police and prosecutor units to deal with repeat offenders. III Research that confirmed the link between drugs and crime.
    [Show full text]
  • John Lennon from ‘Imagine’ to Martyrdom Paul Mccartney Wings – Band on the Run George Harrison All Things Must Pass Ringo Starr the Boogaloo Beatle
    THE YEARS 1970 -19 8 0 John Lennon From ‘Imagine’ to martyrdom Paul McCartney Wings – band on the run George Harrison All things must pass Ringo Starr The boogaloo Beatle The genuine article VOLUME 2 ISSUE 3 UK £5.99 Packed with classic interviews, reviews and photos from the archives of NME and Melody Maker www.jackdaniels.com ©2005 Jack Daniel’s. All Rights Reserved. JACK DANIEL’S and OLD NO. 7 are registered trademarks. A fine sippin’ whiskey is best enjoyed responsibly. by Billy Preston t’s hard to believe it’s been over sent word for me to come by, we got to – all I remember was we had a groove going and 40 years since I fi rst met The jamming and one thing led to another and someone said “take a solo”, then when the album Beatles in Hamburg in 1962. I ended up recording in the studio with came out my name was there on the song. Plenty I arrived to do a two-week them. The press called me the Fifth Beatle of other musicians worked with them at that time, residency at the Star Club with but I was just really happy to be there. people like Eric Clapton, but they chose to give me Little Richard. He was a hero of theirs Things were hard for them then, Brian a credit for which I’m very grateful. so they were in awe and I think they had died and there was a lot of politics I ended up signing to Apple and making were impressed with me too because and money hassles with Apple, but we a couple of albums with them and in turn had I was only 16 and holding down a job got on personality-wise and they grew to the opportunity to work on their solo albums.
    [Show full text]
  • Patent Law: a Handbook for Congress
    Patent Law: A Handbook for Congress September 16, 2020 Congressional Research Service https://crsreports.congress.gov R46525 SUMMARY R46525 Patent Law: A Handbook for Congress September 16, 2020 A patent gives its owner the exclusive right to make, use, import, sell, or offer for sale the invention covered by the patent. The patent system has long been viewed as important to Kevin T. Richards encouraging American innovation by providing an incentive for inventors to create. Without a Legislative Attorney patent system, the reasoning goes, there would be little incentive for invention because anyone could freely copy the inventor’s innovation. Congressional action in recent years has underscored the importance of the patent system, including a major revision to the patent laws in 2011 in the form of the Leahy-Smith America Invents Act. Congress has also demonstrated an interest in patents and pharmaceutical pricing; the types of inventions that may be patented (also referred to as “patentable subject matter”); and the potential impact of patents on a vaccine for COVID-19. As patent law continues to be an area of congressional interest, this report provides background and descriptions of several key patent law doctrines. The report first describes the various parts of a patent, including the specification (which describes the invention) and the claims (which set out the legal boundaries of the patent owner’s exclusive rights). Next, the report provides detail on the basic doctrines governing patentability, enforcement, and patent validity. For patentability, the report details the various requirements that must be met before a patent is allowed to issue.
    [Show full text]
  • Patent and Trademark Cases Stephen Mcjohn
    Northwestern Journal of Technology and Intellectual Property Volume 9 Article 1 Issue 4 January Spring 2011 Top Tens in 2010: Patent and Trademark Cases Stephen McJohn Recommended Citation Stephen McJohn, Top Tens in 2010: Patent and Trademark Cases, 9 Nw. J. Tech. & Intell. Prop. 1 (2011). https://scholarlycommons.law.northwestern.edu/njtip/vol9/iss4/1 This Perspective is brought to you for free and open access by Northwestern Pritzker School of Law Scholarly Commons. It has been accepted for inclusion in Northwestern Journal of Technology and Intellectual Property by an authorized editor of Northwestern Pritzker School of Law Scholarly Commons. NORTHWESTERN JOURNAL OF TECHNOLOGY AND INTELLECTUAL PROPERTY Top Tens in 2010: Patent and Trademark Cases Stephen McJohn January 2011 VOL. 9, NO. 4 © 2011 by Northwestern University School of Law Northwestern Journal of Technology and Intellectual Property Copyright 2011 by Northwestern University School of Law Volume 9, Number 4 (January 2011) Northwestern Journal of Technology and Intellectual Property Top Tens in 2010: Patent and Trademark Cases By Stephen McJohn* ¶1 The following are notable intellectual property decisions for patent and trademark in 2010 in the United States. Notable copyright and trade secret cases will be examined in a subsequent article. Viewed across doctrinal lines, some interesting threads emerge involving the scope of protection, the amount of secondary liability, and ownership of the intellectual property rights. ¶2 The scope of protection was at issue in both areas. Bilski v. Kappos marked a shift from using technical tests for patent subject matter to relying on the basic exclusions against patents on laws of nature, physical phenomena, or abstract ideas.1 Ass’n for Molecular Pathology v.
    [Show full text]
  • Protecting Those Who Blow the Whistle on Government Wrongdoing
    Statement of Glenn A. Fine Principal Deputy Inspector General, Performing the Duties of the Inspector General, Department of Defense for a Hearing on Protecting Those Who Blow the Whistle on Government Wrongdoing Before the Subcommittee on Government Operations Committee on Oversight and Reform U.S. House of Representatives January 28, 2020 Chairman Connolly, Ranking Member Meadows, and members of the subcommittee, thank you for inviting me to appear before you today for this hearing on the contributions of federal whistleblowers and the need to protect them from reprisal. I. INTRODUCTION My testimony will focus on the important work of the Department of Defense Office of Inspector General (DoD OIG) relating to whistleblowers. I am the DoD Principal Deputy Inspector General, Performing the Duties of the Inspector General, and have been serving as the head of the DoD OIG for over 4 years. Prior to this position, in addition to working as an attorney in private practice, I was the Inspector General of the Department of Justice for 11 years, from 2000 to 2011. In my testimony today, I will discuss the significant contributions of whistleblowers, why the protection of whistleblowers is so important, how the DoD OIG evaluates and investigates whistleblower disclosures and complaints of reprisal, and several best practices we have implemented at the DoD OIG to improve our timeliness and efficiency in whistleblower investigations. Specifically, my testimony discusses: • the mission and responsibilities of the DoD OIG, • the importance of whistleblowers and the need to protect them from reprisal, • examples of cases resulting from whistleblower disclosures, • the DoD OIG’s investigative processes, • best practices that the DoD OIG has implemented to improve the timeliness and efficiency of reprisal investigations, 1 • the need for DoD management to take timely corrective action on substantiated whistleblower reprisal investigations, and • the need for adequate resources to handle these important responsibilities.
    [Show full text]
  • Audiences, Gender and Community in Fan Vidding Katharina M
    University of Wollongong Research Online University of Wollongong Thesis Collection University of Wollongong Thesis Collections 2011 "Veni, Vidi, Vids!" audiences, gender and community in Fan Vidding Katharina M. Freund University of Wollongong, [email protected] Recommended Citation Freund, Katharina M., "Veni, Vidi, Vids!" audiences, gender and community in Fan Vidding, Doctor of Philosophy thesis, School of Social Sciences, Media and Communications, Faculty of Arts, University of Wollongong, 2011. http://ro.uow.edu.au/theses/3447 Research Online is the open access institutional repository for the University of Wollongong. For further information contact the UOW Library: [email protected] “Veni, Vidi, Vids!”: Audiences, Gender and Community in Fan Vidding A thesis submitted in fulfilment of the requirements for the award of the degree Doctor of Philosophy From University of Wollongong by Katharina Freund (BA Hons) School of Social Sciences, Media and Communications 2011 CERTIFICATION I, Katharina Freund, declare that this thesis, submitted in fulfilment of the requirements for the award of Doctor of Philosophy, in the Arts Faculty, University of Wollongong, is wholly my own work unless otherwise referenced or acknowledged. The document has not been submitted for qualifications at any other academic institution. Katharina Freund 30 September, 2011 i ABSTRACT This thesis documents and analyses the contemporary community of (mostly) female fan video editors, known as vidders, through a triangulated, ethnographic study. It provides historical and contextual background for the development of the vidding community, and explores the role of agency among this specialised audience community. Utilising semiotic theory, it offers a theoretical language for understanding the structure and function of remix videos.
    [Show full text]
  • Digital Rights Management and the Process of Fair Use Timothy K
    University of Cincinnati College of Law University of Cincinnati College of Law Scholarship and Publications Faculty Articles and Other Publications Faculty Scholarship 1-1-2006 Digital Rights Management and the Process of Fair Use Timothy K. Armstrong University of Cincinnati College of Law Follow this and additional works at: http://scholarship.law.uc.edu/fac_pubs Part of the Intellectual Property Commons Recommended Citation Armstrong, Timothy K., "Digital Rights Management and the Process of Fair Use" (2006). Faculty Articles and Other Publications. Paper 146. http://scholarship.law.uc.edu/fac_pubs/146 This Article is brought to you for free and open access by the Faculty Scholarship at University of Cincinnati College of Law Scholarship and Publications. It has been accepted for inclusion in Faculty Articles and Other Publications by an authorized administrator of University of Cincinnati College of Law Scholarship and Publications. For more information, please contact [email protected]. Harvard Journal ofLaw & Technology Volume 20, Number 1 Fall 2006 DIGITAL RIGHTS MANAGEMENT AND THE PROCESS OF FAIR USE Timothy K. Armstrong* TABLE OF CONTENTS I. INTRODUCTION: LEGAL AND TECHNOLOGICAL PROTECTIONS FOR FAIR USE OF COPYRIGHTED WORKS ........................................ 50 II. COPYRIGHT LAW AND/OR DIGITAL RIGHTS MANAGEMENT .......... 56 A. Traditional Copyright: The Normative Baseline ........................ 56 B. Contemporary Copyright: DRM as a "Speedbump" to Slow Mass Infringement ..........................................................
    [Show full text]
  • Copyright Online Education
    Roadmap Copyright online education April 2018 Education and Student Affairs 1 | Roadmap for Copyright April 2018 Table of content Table of content ....................................................................................2 Introduction .........................................................................................3 Open Education and Licenses ...................................................................4 What you further have to know about Creative Commons .............................6 What is… .............................................................................................7 Flow chart for the use of footage in ..........................................................9 Searching for images, audio or video via CC Search ................................... 10 More websites with new CC footage ........................................................ 11 Attributing works ................................................................................. 12 Copyright and Brightspace .................................................................... 14 Contact .............................................................................................. 16 2 | Roadmap for Copyright April 2018 1. Introduction Education is based on a foundation of sharing. In our education we share knowledge with our students and our fellow teachers. Sharing educational resources openly and offering open and online courses gives others a chance to benefit from the knowledge we teach. In return others can contribute back
    [Show full text]
  • How Eliminating Search and Index Functionality Reduces Secondary Liability in Peer-To-Peer File-Sharing Cases Luke M
    CORE Metadata, citation and similar papers at core.ac.uk Provided by UW Law Digital Commons (University of Washington) Washington Journal of Law, Technology & Arts Volume 7 | Issue 1 Article 4 7-1-2011 Off with the Head? How Eliminating Search and Index Functionality Reduces Secondary Liability in Peer-to-Peer File-Sharing Cases Luke M. Rona Follow this and additional works at: https://digitalcommons.law.uw.edu/wjlta Part of the Internet Law Commons Recommended Citation Luke M. Rona, Off with the Head? How Eliminating Search and Index Functionality Reduces Secondary Liability in Peer-to-Peer File-Sharing Cases, 7 Wash. J. L. Tech. & Arts 27 (2011). Available at: https://digitalcommons.law.uw.edu/wjlta/vol7/iss1/4 This Article is brought to you for free and open access by the Law Reviews and Journals at UW Law Digital Commons. It has been accepted for inclusion in Washington Journal of Law, Technology & Arts by an authorized editor of UW Law Digital Commons. For more information, please contact [email protected]. Rona: Off with the Head? How Eliminating Search and Index Functionality WASHINGTON JOURNAL OF LAW, TECHNOLOGY & ARTS VOLUME 7, ISSUE 1 SUMMER 2011 OFF WITH THE HEAD? HOW ELIMINATING SEARCH AND INDEX FUNCTIONALITY REDUCES SECONDARY LIABILITY IN PEER-TO-PEER FILE-SHARING CASES Luke M. Rona* © Luke M. Rona CITE AS: 7 Wash J.L. Tech. & Arts 27 (2011) http://digital.law.washington.edu/dspace-law/handle/1773.1/1050 ABSTRACT Peer-to-peer file-sharing service providers (P2Ps) allow Internet users to exchange electronic content, including music, movies, and other digital works.
    [Show full text]
  • Hardness Evaluation of Solving MQ Problems
    MQ Challenge: Hardness Evaluation of Solving MQ Problems Takanori Yasuda (ISIT), Xavier Dahan (ISIT), Yun-Ju Huang (Kyushu Univ.), Tsuyoshi Takagi (Kyushu Univ.), Kouichi Sakurai (Kyushu Univ., ISIT) This work was supported by “Strategic Information and Communications R&D Promotion Programme (SCOPE), no. 0159-0091”, Ministry of Internal Affairs and Communications, Japan. The first author is supported by Grant-in-Aid for Young Scientists (B), Grant number 24740078. Fukuoka MQ challenge MQ challenge started on April 1st. https://www.mqchallenge.org/ ETSI Quantum Safe Workshop 2015/4/3 2 Why we need MQ challenge? • Several public key cryptosystems held contests which solve the associated basic mathematical problems. o RSA challenge(RSA Laboratories), ECC challenge(Certicom), Lattice challenge(TU Darmstadt) • Lattice challenge (http://www.latticechallenge.org/) o Target: Short vector problem o 2008 – now continued • Multivariate public-key cryptsystem (MPKC) also need to evaluate the current state-of-the-art in practical MQ problem solvers. We planed to hold MQ challenge. ETSI Quantum Safe Workshop 2015/4/3 3 Multivariate Public Key Cryptosystem (MPKC) • Advantage o Candidate for post-quantum cryptography o Used for both encryption and signature schemes • Encryption: Simple Matrix scheme (ABC scheme), ZHFE scheme • Signature: UOV, Rainbow o Efficient encryption and decryption and signature generation and verification. • Problems o Exact estimate of security of MPKC schemes o Huge length of secret and public keys in comparison with RSA o New application and function ETSI Quantum Safe Workshop 2015/4/3 4 MQ problem MPKC are public key cryptosystems whose security depends on the difficulty in solving a system of multivariate quadratic polynomials with coefficients in a finite field .
    [Show full text]