Binary codes for collusion-secure fingerprinting

Gérard Cohen, Simon Litsyn, Gilles Zémor

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

We examine the problem of Collusion-Secure Fingerprinting in the case when marks are binary and coalitions are of size 2. We are motivated by two considerations, the pirates’ probablity of success (which must be non-zero, as was shown by Boneh and Shaw) on one hand, and decoding complexity on the other. We show how to minimize the pirates’ probability of success: but the associated decoding complexity is O(M2), where M is the number of users. Next we analyze the Boneh and Shaw replication strategy which features a higher probability of success for the pirates but a lower decoding complexity. There are two variations. In the case when the fingerprinting code is linear we show that the best codes are linear intersecting codes and that the decoding complexity drops to O(log2M). In the case when the fingerprinting code is allowed to be nonlinear, finding the best code amounts to finding the largest B2-sequence of binary vectors, an old combinatorial problem. In that case decoding complexity is intermediate, namely O(M).

Original languageEnglish
Title of host publicationInformation Security and Cryptology - ICISC 2001 - 4th International Conference, Proceedings
EditorsKwangjo Kim
PublisherSpringer Verlag
Pages178-185
Number of pages8
ISBN (Print)3540433198, 9783540433194
DOIs
StatePublished - 2002
Event4th International Conference on Information Security and Cryptology, ICISC 2001 - Seoul, Korea, Republic of
Duration: 6 Dec 20017 Dec 2001

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume2288
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference4th International Conference on Information Security and Cryptology, ICISC 2001
Country/TerritoryKorea, Republic of
CitySeoul
Period6/12/017/12/01

Keywords

  • B-sequence
  • Collusion-resistant code
  • Fingerprinting
  • Intersecting code
  • Watermarking

Fingerprint

Dive into the research topics of 'Binary codes for collusion-secure fingerprinting'. Together they form a unique fingerprint.

Cite this