Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Optimal probabilistic fingerprint codes

Published: 15 May 2008 Publication History

Abstract

We construct binary codes for fingerprinting digital documents. Our codes for n users that are ϵ-secure against c pirates have length O(c2log(n/ϵ)). This improves the codes proposed by Boneh and Shaw [1998] whose length is approximately the square of this length. The improvement carries over to works using the Boneh--Shaw code as a primitive, for example, to the dynamic traitor tracing scheme of Tassa [2005].
By proving matching lower bounds we establish that the length of our codes is best within a constant factor for reasonable error probabilities. This lower bound generalizes the bound found independently by Peikert et al. [2003] that applies to a limited class of codes. Our results also imply that randomized fingerprint codes over a binary alphabet are as powerful as over an arbitrary alphabet and the equal strength of two distinct models for fingerprinting.

References

[1]
Anthapadmanabhan, N. P., Barg, A., and Dumer, I. 2008. On the fingerprinting capacity under the marking assumption. IEEE Trans. Inf. Theory 54 (Feb.).
[2]
Blakley, G. R., Meadows, C., and Purdy, G. B. 1985. Fingerprinting long forgiving messages. In Proceedings of Crypto '85. Springer-Verlag Berlin, Heidelberg, Germany, 180--189.
[3]
Boneh, D., and Franklin, M. 1999. An efficient public key traitor tracing scheme. In Proceedings of Crypto '99. Springer-Verlag, Berlin, Heidelberg, Germany, 338--353.
[4]
Boneh, D., and Shaw, J. 1998. Collusion-secure fingerprinting for digital data. IEEE Trans. Inf. Theory 44, 480--491.
[5]
Chor, B., Fiat, A., and Naor, M. 1994. Tracing traitors. In Proceedings of Crypto '94. Lecture Notes in Computer Science, vol. 839. Springer-Verlag, Berlin, Heidelberg, Germany, 257--270.
[6]
Chung, F., Graham, R., and Leighton, T. 2001. Guessing secrets. Electron. J. Combinat. 8.
[7]
Fiat, A., and Tassa, T. 2001. Dynamic traitor tracing. J. Crypt. 14, 3, 211--223.
[8]
Guth, J., and Pfitzmann, B. 2000. Error- and collusion-secure fingerprinting for digital data. In Proceedings of the Symposium on Information Hiding '99. Springer-Verlag, Berlin, 134--145. LNCS 1768.
[9]
Kilian, J., Leighton, T., Matheson, L., Shamoon, T., Tarjan, R., and Zane, F. 1998. Resistance of digital watermarks to collusive attacks. In Proceedings of the IEEE International Symposium on Information Theory. IEEE Computer Society Press, Los Alamitos, CA, 71.
[10]
Kurosawa, K., and Desmedt, Y. 1998. Optimum traitor tracing and asymmetric schemes. In Advances in Cryptology—EUROCRYPT'98. Lecture Notes in Computer Science, vol. 1403. Springer, Berlin, Germany, 145--157.
[11]
Lindkvist, T. 1999. Fingerprinting digital documents. Ph.D. dissertation. Linköping Studies in Science and Technology. Thesis No. 798.
[12]
Peikert, C., Shelat, A., and Smith, A. 2003. Lower bounds for collusion-secure fingerprinting. In Proceedings of the 14th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA). ACM, New York, 472--479.
[13]
Rényi, A. 1970. Probability theory. North-Holland Series in Applied Mathematics and Mechanics, vol. 10. North-Holland Publishing Co., Amsterdam, London; American Elsevier Publishing Co., Inc., New York.
[14]
Safavi-Naini, R., and Wang, Y. 2000. Sequential traitor tracing. In Proceedings of Crypto '2000. Lecture Notes in Computer Science, vol. 1880. Springer-Verlag Berlin, Heidelberg, Germany, 316--332.
[15]
Staddon, J. N., Stinson, D. R., and Wei, R. 2001. Combinatorial properties of frameproof and traceability codes. IEEE Trans. Inf. Theory 47, 1042--1049.
[16]
Tardos, G. 2003. Optimal probabilistic fingerprint codes. In Proceedings of the 35th Annual ACM Symposium on Theory of Computing (STOC). ACM, New York, 116--125.
[17]
Tassa, T. 2005. Low bandwidth dynamic traitor tracing schemes. J. Crypt. 18, 167--183.
[18]
Wagner, N. 1983. Fingerprinting. In Proceedings of the 1983 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, Los Alamitos, CA, 18--22.
[19]
Yacobi, Y. 2001. Improved Boneh--Shaw content fingerprinting. In Topics in Cryptology—CT-RSA 2001. Lecture Notes in Computer Science, vol. 2020. Springer-Verlag Berlin, Germany, 378--391.

Cited By

View all
  • (2025)FingerprintingEncyclopedia of Cryptography, Security and Privacy10.1007/978-3-030-71522-9_381(919-923)Online publication date: 8-Jan-2025
  • (2024)Information complexity of stochastic convex optimizationProceedings of the 41st International Conference on Machine Learning10.5555/3692070.3692151(2035-2068)Online publication date: 21-Jul-2024
  • (2024) Synergistic Commutative Algorithm for Securing Vector Spatial Data via GD ‐ PBIBD Fingerprint Encoding and Data Encryption Transactions in GIS10.1111/tgis.13254Online publication date: 9-Oct-2024
  • Show More Cited By

Recommendations

Reviews

J Wolper

A fingerprint is a serial number embedded in a digital entity that enables tracing the source of a pirated version. A historical example is the introduction of small errors in low-order digits of tables of logarithms [1]. Pirates with multiple copies can identify where differences occur and, thus, alter part of the serial number. More pirates can alter the serial number even more, but information about the original serial numbers remains. This paper improves on previous results [1] that used a random matrix, by a clever choice of probability distribution of the bits in the matrix of serial numbers. The statistics of the distribution allow for a detailed analysis of the probability of accusing a pirate, which is high, and of the probability of accusing an innocent user, which is low. An accusation of piracy occurs when a score exceeds a certain threshold. The score is increased substantially when a bit is inconsistent with the distribution, and decreased when the bit is consistent. In other words, if 0 is expected but 1 is seen, add a lot to the score; if 0 is both expected and seen, subtract a little. Such results are seldom seen in the fingerprinting literature. In this paper, the codes constructed are shorter than those of Boneh and Shaw [1]. The probabilistic analysis is much more detailed and sophisticated than what is typically found in a computer science journal. Online Computing Reviews Service

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.

Comments

Information & Contributors

Information

Published In

cover image Journal of the ACM
Journal of the ACM  Volume 55, Issue 2
May 2008
282 pages
ISSN:0004-5411
EISSN:1557-735X
DOI:10.1145/1346330
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 15 May 2008
Accepted: 01 January 2008
Revised: 01 April 2004
Received: 01 August 2003
Published in JACM Volume 55, Issue 2

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Fingerprint codes
  2. collusion attack

Qualifiers

  • Research-article
  • Research
  • Pre-selected

Funding Sources

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)75
  • Downloads (Last 6 weeks)13
Reflects downloads up to 25 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2025)FingerprintingEncyclopedia of Cryptography, Security and Privacy10.1007/978-3-030-71522-9_381(919-923)Online publication date: 8-Jan-2025
  • (2024)Information complexity of stochastic convex optimizationProceedings of the 41st International Conference on Machine Learning10.5555/3692070.3692151(2035-2068)Online publication date: 21-Jul-2024
  • (2024) Synergistic Commutative Algorithm for Securing Vector Spatial Data via GD ‐ PBIBD Fingerprint Encoding and Data Encryption Transactions in GIS10.1111/tgis.13254Online publication date: 9-Oct-2024
  • (2024)StreamingTag: A Scalable Piracy Tracking Solution for Mobile Streaming ServicesIEEE Transactions on Mobile Computing10.1109/TMC.2024.344541123:12(14530-14543)Online publication date: 1-Dec-2024
  • (2024)Collusion-Resilient Privacy-Preserving Database FingerprintingIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.345574819(8306-8321)Online publication date: 1-Jan-2024
  • (2024)A Bias-Accuracy-Privacy Trilemma for Statistical EstimationJournal of the American Statistical Association10.1080/01621459.2024.2443275(1-23)Online publication date: 20-Dec-2024
  • (2024)A traceable and revocable broadcast encryption scheme for preventing malicious encryptors in Medical IoTJournal of Systems Architecture10.1016/j.sysarc.2024.103100149(103100)Online publication date: Apr-2024
  • (2024)Accountability for Misbehavior in Threshold Decryption via Threshold Traitor TracingAdvances in Cryptology – CRYPTO 202410.1007/978-3-031-68394-7_11(317-351)Online publication date: 18-Aug-2024
  • (2024)Traceable Secret Sharing: Strong Security and Efficient ConstructionsAdvances in Cryptology – CRYPTO 202410.1007/978-3-031-68388-6_9(221-256)Online publication date: 17-Aug-2024
  • (2023)Privacy auditing with one (1) training runProceedings of the 37th International Conference on Neural Information Processing Systems10.5555/3666122.3668265(49268-49280)Online publication date: 10-Dec-2023
  • Show More Cited By

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media