Fighting Two Pirates
نویسنده
چکیده
A pirate is a person who buys a legal copy of a copyrighted work and who reproduces it to sell illegal copies. Artists and authors are worried as they do not get the income which is legally theirs. It has been suggested to mark every copy sold with a unique fingerprint, so that any unauthorised copy may be traced back to the source and the pirate who bought it. The fingerprint must be embedded in such a way that it cannot be destroyed. Two pirates who cooperate, can compare their copies and they will find some bits which differ. These bits must be part of the fingerprint, and when the pirates can see and change these bits, they get an illegal copy with neither of their fingerprints. Collusion-secure fingerprinting schemes are designed to trace at least one of the pirates in such a collusion. In this paper we prove that socalled (2,2)-separating codes often are collusionsecure against two pirates. In particular, we consider the best known explicit asymptotic construction of such codes, and prove that it is collusion-secure with better rate than any previously known schemes.
منابع مشابه
Resistance to Pirates 2.0: A Method from Leakage Resilient Cryptography
In the classical model of traitor tracing, one assumes that a traitor contributes its entire secret key to build a pirate decoder. However, new practical scenarios of pirate has been considered, namely Pirate Evolution Attacks at Crypto 2007 and Pirates 2.0 at Eurocrypt 2009, in which pirate decoders could be built from sub-keys of users. The key notion in Pirates 2.0 is the anonymity level of ...
متن کاملThe Interplay between Seeders and Pirates in P2P Networks: An Empirical Analysis
We study the propagation of digital piracy in P2P networks with two population segments: seeders, who are original suppliers of files and pirates, who copy the files. Early on, seeders are the primary supply source for pirates, while later on, pirates can also function as suppliers of the file. The mixture of these two segments enables or impedes the piracy propagation rate over time. In this p...
متن کاملThe Somali Piracy Problem: A Global Puzzle Necessitating A Global Solution
Over the past few years, piracy has exploded off the coast of Somalia. The Somali pirates congregate on a mother ship and then divide into smaller groups that sail out on tiny skiffs. Using potent weapons like AK-47’s and hand-propelled grenades, the Somali pirates then attack civilian ships carrying cargo through the Gulf of Aden, toward South Africa or Asia. Once they have overtaken the victi...
متن کاملHigh rate fingerprinting codes and the fingerprinting capacity
Including a unique code in each copy of a distributed document is an effective way of fighting intellectual piracy. Codes designed for this purpose that are secure against collusion attacks are called fingerprinting codes. In this paper we consider fingerprinting with the marking assumption and design codes that achieve much higher rates than previous constructions. We conjecture that these cod...
متن کاملPirates! Using the Physical World as a Game Board
We explore how computer games can be designed to maintain some of the social aspects of traditional game play, by moving computational game elements into the physical world. We have constructed a mobile multiplayer game, Pirates!, to illustrate how wireless and proximity-sensing technology can be integrated in the design of new game experiences. We describe Pirates! and its implementation, and ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2003