Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Binary Codes for Collusion-Secure Fingerprinting

  • Conference paper
  • First Online:
Information Security and Cryptology — ICISC 2001 (ICISC 2001)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2288))

Included in the following conference series:

Abstract

We examine the problem of Collusion-Secure Fingerprinting in the case when marks are binary and coalitions are of size 2. We are motivated by two considerations, the pirates’ probablity of success (which must be non-zero, as was shown by Boneh and Shaw) on one hand, and decoding complexity on the other. We show how to minimize the pirates’ probability of success: but the associated decoding complexity is O(M 2), where M is the number of users. Next we analyze the Boneh and Shaw replication strategy which features a higher probability of success for the pirates but a lower decoding complexity. There are two variations. In the case when the fingerprinting code is linear we show that the best codes are linear intersecting codes and that the decoding complexity drops to O(log2 M). In the case when the fingerprinting code is allowed to be nonlinear, finding the best code amounts to finding the largest B 2-sequence of binary vectors, an old combinatorial problem. In that case decoding complexity is intermediate, namely O(M).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Barg, A., Cohen, G., Encheva, S., Kabatiansky, G., Zémor, G.: A hypergraph approach to the identifying parent property. SIAM J. on Discrete Math. 14 (2001) 423–431

    Article  MATH  Google Scholar 

  2. Boneh, D., Shaw, J.: Collusion-Secure Fingerprinting for Digital Data. IEEE Trans. Inf. Theory. IT-44 (1998) 1897–1905 (preliminary version in Crypto’95).

    Article  MathSciNet  Google Scholar 

  3. Cohen, G., Lempel, A.: Linear intersecting codes. Discrete Math. 56 (1985) 35–43

    Article  MATH  MathSciNet  Google Scholar 

  4. Cohen, G., Litsyn, S., Zémor, G.: Binary B 2-Sequences: a new upper bound. J. Combinatorial Theory, Series A. 94 (2001) 152–155

    Article  MATH  Google Scholar 

  5. Cohen, G., Zémor, G.: Intersecting codes and independent families. IEEE Trans. Inf. Theory. IT-40 (1994) 1872–1881

    Article  Google Scholar 

  6. Hollmann, H.D., van Lint, J.H., Linnartz, J.-P., Tolhuizen, L.M.: On codes with the identifiable parent property. J. Combinatorial Theory, Series A. 82 (1998) 121–133

    Article  MATH  Google Scholar 

  7. Katona, G., Srivastava, J.: Minimal 2-coverings of a finite affine space based on GF(2). J. Stat. Planning and Inference. 8 (1983) 375–388

    Article  MATH  MathSciNet  Google Scholar 

  8. Lindström, B.: On B 2-Sequences of Vectors. J. of Number Theory. 4 (1972) 261–265

    Article  MATH  Google Scholar 

  9. Miklós, D.: Linear binary codes with intersection properties. Discrete Appl. Math. 9 (1984) 187–196

    Article  MATH  MathSciNet  Google Scholar 

  10. McEliece, R. J., Rodemich, E. R., Rumsey, H. C. Welch, L. R.: New upper bounds on the rate of a code via the Delsarte-MacWilliams inequalities. IEEE Trans. Inf. Theory. IT-23 (1977) 157–166

    Article  MathSciNet  Google Scholar 

  11. Sagalovitch, Yu. L.: Methods of introducing redundancy for raising the reliability of a finite automaton. Problems of Information Transmission. 4 (1968) 62–72

    MathSciNet  Google Scholar 

  12. Sagalovitch, Yu. L.: Separating systems. Problems of Information Transmission. 30 (1994) 105–123

    MathSciNet  Google Scholar 

  13. Sloane, N. J. A.: Covering arrays and intersecting codes. J. Combinator. Designs. 1 (1993) 51–63

    Article  MATH  MathSciNet  Google Scholar 

  14. Staddon, J. N., Stinson, D. R., Wei, R.: Combinatorial properties of frameproof and traceability codes. IEEE Trans. Inf. Theory. IT-47 (2001) 1042–1049

    Article  MathSciNet  Google Scholar 

  15. Stinson, D.R., Tran Van Trung, Wei, R.: Secure Frameproof Codes, Key Distribution Patterns, Group Testing Algorithms and Related Structures. J. Stat. Planning and Inference. 86 (2000) 595–617

    Article  MATH  Google Scholar 

  16. Stinson, D.R., Wei, R.: Combinatorial properties and constructions of traceability schemes and frameproof codes. SIAM J. Discrete Math. 11 (1998) 41–53.

    Article  MATH  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Cohen, G., Litsyn, S., Zémor, G. (2002). Binary Codes for Collusion-Secure Fingerprinting. In: Kim, K. (eds) Information Security and Cryptology — ICISC 2001. ICISC 2001. Lecture Notes in Computer Science, vol 2288. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45861-1_14

Download citation

  • DOI: https://doi.org/10.1007/3-540-45861-1_14

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-43319-4

  • Online ISBN: 978-3-540-45861-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics