2011
DOI: 10.1007/978-3-642-24178-9_4
|View full text |Cite
|
Sign up to set email alerts
|

An Asymmetric Fingerprinting Scheme Based on Tardos Codes

Abstract: Abstract. Asymmetric fingerprinting protocols are designed to prevent an untrustworthy Provider incriminating an innocent Buyer. These protocols enable the Buyer to generate their own fingerprint by themself, and ensure that the Provider never has access to the Buyer's copy of the Work. Until recently, such protocols were not practical because the collusion-resistant codes they rely on were too long. However, the advent of Tardos codes means that the probabilistic collusion-resistant codes are now sufficiently… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
29
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 31 publications
(30 citation statements)
references
References 22 publications
(37 reference statements)
0
29
0
Order By: Relevance
“…The original paper [2] was followed by a flurry of activity, e.g. improved analyses [3]- [8], code modifications [9]- [11], decoder modifications [12]- [14] and various generalizations [15]- [18]. The advantage of bias-based versus deterministic codes is that they can achieve the asymptotically optimal relationship ∝ c 2 between the sufficient code length and the coalition size c.…”
Section: Introductionmentioning
confidence: 99%
“…The original paper [2] was followed by a flurry of activity, e.g. improved analyses [3]- [8], code modifications [9]- [11], decoder modifications [12]- [14] and various generalizations [15]- [18]. The advantage of bias-based versus deterministic codes is that they can achieve the asymptotically optimal relationship ∝ c 2 between the sufficient code length and the coalition size c.…”
Section: Introductionmentioning
confidence: 99%
“…improved analyses, 2-7 code modifications, [8][9][10] decoder modifications [11][12][13] and various generalizations. [14][15][16][17] The advantage of bias-based versus deterministic codes is that they can achieve a code length as short as ∝ c 2 , i.e. quadratic in the coalition size c.…”
Section: Collusion Attacks On Watermarkingmentioning
confidence: 99%
“…The original paper [21] was followed by a flurry of activity, e.g. improved analyses [2,6,7,10,16,20], code modifications [8,14,15], decoder modifications [1,5,12] and various generalizations [4,17,18,22]. The advantage of bias-based versus deterministic codes is that they can achieve the asymptotically optimal relationship ∝ c 2 between the sufficient code length and the coalition size c.…”
Section: Collusion Attacks On Watermarkingmentioning
confidence: 99%
“…whereμinn,σinn andμC depend on the function h as specified in (4)(5)(6). The optimal h is found by solving the set of equations δL/δh = 0, ∂L/∂λ1 = 0 and ∂L/∂λ2 = 0.…”
Section: Optimal Suspicion Functionsmentioning
confidence: 99%