2011
DOI: 10.1007/s10623-011-9563-4
|View full text |Cite
|
Sign up to set email alerts
|

Accusation probabilities in Tardos codes: beyond the Gaussian approximation

Abstract: We study the probability distribution of user accusations in the q-ary Tardos fingerprinting system under the Marking Assumption, in the restricted digit model. In particular, we look at the applicability of the so-called Gaussian approximation, which states that accusation probabilities tend to the normal distribution when the fingerprinting code is long. We introduce a novel parametrization of the attack strategy which enables a significant speedup of numerical evaluations. We set up a method, based on power… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
41
0

Year Published

2012
2012
2015
2015

Publication Types

Select...
5

Relationship

3
2

Authors

Journals

citations
Cited by 18 publications
(41 citation statements)
references
References 20 publications
0
41
0
Order By: Relevance
“…However, these arguments are not very precise. In [14] and [13] an in-depth analytical and numerical investigation of the Gaussian approximation was given in the RDM case. The approach is based on the convolution rule for characteristic functions, and a way to express the false accusation probability as a power series expansion in the small parameter 1/m.…”
Section: Exact Computation Of the False Positive Error Probabilitymentioning
confidence: 99%
See 4 more Smart Citations
“…However, these arguments are not very precise. In [14] and [13] an in-depth analytical and numerical investigation of the Gaussian approximation was given in the RDM case. The approach is based on the convolution rule for characteristic functions, and a way to express the false accusation probability as a power series expansion in the small parameter 1/m.…”
Section: Exact Computation Of the False Positive Error Probabilitymentioning
confidence: 99%
“…For instance, if the false positive rate is around 10 −10 , then a number of simulations of order at least 10 10 is required to measure this rate; in contrast, the computational effort in the CSE method does not depend on the error rate. The work of [14,13] showed, for various parameter settings and attack strategies, how the false positive probability has a transition from Gaussian behaviour in the central region to worse-thanGaussian behaviour outside the center. However, a number of questions were left unanswered.…”
Section: Exact Computation Of the False Positive Error Probabilitymentioning
confidence: 99%
See 3 more Smart Citations