Abstract
A fingerprinting code is a set of codewords that are embedded in each copy of a digital object with the purpose of making each copy unique. If the fingerprinting code is c-secure with ε error, then the decoding of a pirate word created by a coalition of at most c dishonest users, will expose at least one of the guilty parties with probability 1–ε.
The Boneh-Shaw fingerprinting codes are n-secure codes with ε error, where n also denotes the number of authorized users. Unfortunately, the length the Boneh-Shaw codes should be of order O(n 3log(n/ε)), which is prohibitive for practical applications. In this paper, we prove that the Boneh-Shaw codes are (c< n)-secure for lengths of order O(nc 2log(n/ε)).
Moreover we show how to use these codes to construct binary fingerprinting codes with length L=O(c 6logc logn), with probability of error O(1/n)=exp(–Ω(L)), and identification algorithm of complexity poly(logn)=poly(L). These results improve in some aspects the best known schemes and with a much more simple construction.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Barg, A., Blakey, G.R., Kabatiansky, G.A.: Digital fingerprinting codes: Problem statements, constructions, identification of traitors. IEEE Trans. Inform. Theory 49(4), 852–865 (2003)
Boneh, D., Shaw, J.: Collusion-secure fingerprinting for digital data. IEEE Trans. Inform. Theory 44(95), 1897–1905 (1998)
Forney, G.: Concatenated codes. MIT Press, Cambridge (1966)
Guruswami, V., Sudan, M.: Improved decoding of Reed-Solomon codes and algebraic geometry codes. IEEE Trans. Inform. Theory 45(6), 1757–1767 (1999)
Hoeffding, W.: Probability inequalities for sums of bounded random variables. J. Amer. Statist. Assoc. 58(301), 13–30 (1963)
Tardos, G.: Optimal probabilistic fingerprint codes. In: Proceedings of the 35th Annual ACM Symposium on Theory of Computing, pp. 116–125 (2003)
Tsfasman, M., Vlăduţ, S.: Algebraic-geometric codes. Kluwer, Dordrecht (1991)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Fernandez, M., Cotrina, J. (2006). Obtaining Asymptotic Fingerprint Codes Through a New Analysis of the Boneh-Shaw Codes. In: Lipmaa, H., Yung, M., Lin, D. (eds) Information Security and Cryptology. Inscrypt 2006. Lecture Notes in Computer Science, vol 4318. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11937807_23
Download citation
DOI: https://doi.org/10.1007/11937807_23
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-49608-3
Online ISBN: 978-3-540-49610-6
eBook Packages: Computer ScienceComputer Science (R0)