Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes
نویسندگان
چکیده
Fingerprinting provides a means of tracing unauthorized redistribution of digital data by individually marking each authorized copy with a personalized serial number. In order to prevent a group of users from collectively escaping identi cation, collusion-secure ngerprinting codes have been proposed. In this paper, we introduce a new construction of a collusion-secure ngerprinting code which is similar to a recent construction by Tardos but achieves shorter code lengths and allows for codes over arbitrary alphabets. For binary alphabets, n users and a false accusation probability of , a code length of m c0 ln(n= ) is provably suÆcient to withstand collusion attacks of at most c0 colluders. This improves Tardos' construction by a factor of 10. Furthermore, invoking the Central Limit Theorem we show that even a code length of m 1 2 2c20 ln(n= ) is suÆcient in most cases. For q-ary alphabets, assuming the restricted digit model, the code size can be further reduced. Numerical results show that a reduction of 35% is achievable for q = 3 and 80% for q = 10.
منابع مشابه
On the Design and Optimization of Tardos Probabilistic Fingerprinting Codes
G. Tardos [1] was the first to give a construction of a fingerprinting code whose length meets the lowest known bound inO(c log n 1 ). This was a real breakthrough because the construction is very simple. Its efficiency comes from its probabilistic nature. However, although G. Tardos almost gave no argument of his rationale, many parameters of his code are precisely fine-tuned. This paper propo...
متن کاملBinary and q-ary Tardos codes, revisited
The Tardos code is a much studied collusion-resistant fingerprinting code, with the special property that it has asymptotically optimal length m ∝ c0, where c0 is the number of colluders. In this paper we give alternative security proofs for the Tardos code, working with the assumption that the strongest coalition strategy is position-independent. We employ the Bernstein inequality and Bennett ...
متن کاملAn Asymmetric Fingerprinting Scheme Based on Tardos Codes
Tardos codes are currently the state-of-the-art in the design of practical collusion-resistant fingerprinting codes. They rely on a secret vector drawn from a publicly known probability distribution in order to generate each Buyer’s fingerprint. For security purposes, this secret vector must not be revealed to the Buyers. To prevent an untrustworthy Provider forging a copy of a Work with an inn...
متن کاملOptimal symmetric Tardos traitor tracing schemes
For the Tardos traitor tracing scheme, we show that by combining the symbol-symmetric accusation function of Škorić et al. with the improved analysis of Blayer and Tassa we get further improvements. Our construction gives codes that are up to 4 times shorter than Blayer and Tassa’s, and up to 2 times shorter than the codes from Škorić et al. Asymptotically, we achieve the theoretical optimal co...
متن کاملHigh rate fingerprinting codes and the fingerprinting capacity
Including a unique code in each copy of a distributed document is an effective way of fighting intellectual piracy. Codes designed for this purpose that are secure against collusion attacks are called fingerprinting codes. In this paper we consider fingerprinting with the marking assumption and design codes that achieve much higher rates than previous constructions. We conjecture that these cod...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2007 شماره
صفحات -
تاریخ انتشار 2007