Abstract
We discuss a strategy initiated by Boneh and Shaw for Collusion-Secure Fingerprinting. We show that under this strategy, finding fingerprinting schemes that resist coalitions of two users amounts to finding B2-sequences of binary vectors. A sequence of vectors v1, v2,..., vn is a B2-sequence if all sums vi + vj, 1 ≤ i ≤ j ≤ n, are different : the associated extremal set-theoretic problem is what is the maximal size of a B2-sequence? We shed new light on this old combinatorial problem and improve on previously known upper bounds.
| Original language | English |
|---|---|
| Pages (from-to) | 242 |
| Number of pages | 1 |
| Journal | IEEE International Symposium on Information Theory - Proceedings |
| State | Published - 2000 |
| Externally published | Yes |
| Event | 2000 IEEE International Symposium on Information Theory - Serrento, Italy Duration: 25 Jun 2000 → 30 Jun 2000 |
Fingerprint
Dive into the research topics of 'Collusion-secure fingerprinting and B2-sequences'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver