Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes

نویسندگان

  • Boris Skoric
  • Stefan Katzenbeisser
  • Mehmet Utku Celik
چکیده

Fingerprinting provides a means of tracing unauthorized redistribution of digital data by individually marking each authorized copy with a personalized serial number. In order to prevent a group of users from collectively escaping identi cation, collusion-secure ngerprinting codes have been proposed. In this paper, we introduce a new construction of a collusion-secure ngerprinting code which is similar to a recent construction by Tardos but achieves shorter code lengths and allows for codes over arbitrary alphabets. For binary alphabets, n users and a false accusation probability of , a code length of m c0 ln(n= ) is provably suÆcient to withstand collusion attacks of at most c0 colluders. This improves Tardos' construction by a factor of 10. Furthermore, invoking the Central Limit Theorem we show that even a code length of m 1 2 2c20 ln(n= ) is suÆcient in most cases. For q-ary alphabets, assuming the restricted digit model, the code size can be further reduced. Numerical results show that a reduction of 35% is achievable for q = 3 and 80% for q = 10.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On the Design and Optimization of Tardos Probabilistic Fingerprinting Codes

G. Tardos [1] was the first to give a construction of a fingerprinting code whose length meets the lowest known bound inO(c log n 1 ). This was a real breakthrough because the construction is very simple. Its efficiency comes from its probabilistic nature. However, although G. Tardos almost gave no argument of his rationale, many parameters of his code are precisely fine-tuned. This paper propo...

متن کامل

Binary and q-ary Tardos codes, revisited

The Tardos code is a much studied collusion-resistant fingerprinting code, with the special property that it has asymptotically optimal length m ∝ c0, where c0 is the number of colluders. In this paper we give alternative security proofs for the Tardos code, working with the assumption that the strongest coalition strategy is position-independent. We employ the Bernstein inequality and Bennett ...

متن کامل

An Asymmetric Fingerprinting Scheme Based on Tardos Codes

Tardos codes are currently the state-of-the-art in the design of practical collusion-resistant fingerprinting codes. They rely on a secret vector drawn from a publicly known probability distribution in order to generate each Buyer’s fingerprint. For security purposes, this secret vector must not be revealed to the Buyers. To prevent an untrustworthy Provider forging a copy of a Work with an inn...

متن کامل

Optimal symmetric Tardos traitor tracing schemes

For the Tardos traitor tracing scheme, we show that by combining the symbol-symmetric accusation function of Škorić et al. with the improved analysis of Blayer and Tassa we get further improvements. Our construction gives codes that are up to 4 times shorter than Blayer and Tassa’s, and up to 2 times shorter than the codes from Škorić et al. Asymptotically, we achieve the theoretical optimal co...

متن کامل

High rate fingerprinting codes and the fingerprinting capacity

Including a unique code in each copy of a distributed document is an effective way of fighting intellectual piracy. Codes designed for this purpose that are secure against collusion attacks are called fingerprinting codes. In this paper we consider fingerprinting with the marking assumption and design codes that achieve much higher rates than previous constructions. We conjecture that these cod...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2007  شماره 

صفحات  -

تاریخ انتشار 2007