Skip to main navigation Skip to search Skip to main content

Collusion-secure fingerprinting and B2-sequences

  • G. Cohen*
  • , S. Litsyn
  • , G. Zémor
  • *Corresponding author for this work

Research output: Contribution to journalConference articlepeer-review

Abstract

We discuss a strategy initiated by Boneh and Shaw for Collusion-Secure Fingerprinting. We show that under this strategy, finding fingerprinting schemes that resist coalitions of two users amounts to finding B2-sequences of binary vectors. A sequence of vectors v1, v2,..., vn is a B2-sequence if all sums vi + vj, 1 ≤ i ≤ j ≤ n, are different : the associated extremal set-theoretic problem is what is the maximal size of a B2-sequence? We shed new light on this old combinatorial problem and improve on previously known upper bounds.

Original languageEnglish
Pages (from-to)242
Number of pages1
JournalIEEE International Symposium on Information Theory - Proceedings
StatePublished - 2000
Externally publishedYes
Event2000 IEEE International Symposium on Information Theory - Serrento, Italy
Duration: 25 Jun 200030 Jun 2000

Fingerprint

Dive into the research topics of 'Collusion-secure fingerprinting and B2-sequences'. Together they form a unique fingerprint.

Cite this