2009
DOI: 10.1007/s10623-009-9285-z
|View full text |Cite
|
Sign up to set email alerts
|

An improvement of discrete Tardos fingerprinting codes

Abstract: It has been proven that the code lengths of Tardos's collusion-secure fingerprinting codes are of theoretically minimal order with respect to the number of adversarial users (pirates). However, the code lengths can be further reduced as some preceding studies have revealed. In this article we improve a recent discrete variant of Tardos's codes, and give a security proof of our codes under an assumption weaker than the original Marking Assumption. Our analysis shows that our codes have significantly shorter len… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

2
95
0

Year Published

2009
2009
2023
2023

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 77 publications
(99 citation statements)
references
References 11 publications
2
95
0
Order By: Relevance
“…In particular all the papers [8,7,2,6,5] go through the code and the proof in [9] and optimize various parameters to improve various aspects of the code without fundamentally changing the basic structure of the code construction and the accusation algorithm. We are concerned here with improvements of the code length that translates directly to improved rates.…”
Section: Previous Workmentioning
confidence: 99%
“…In particular all the papers [8,7,2,6,5] go through the code and the proof in [9] and optimize various parameters to improve various aspects of the code without fundamentally changing the basic structure of the code construction and the accusation algorithm. We are concerned here with improvements of the code length that translates directly to improved rates.…”
Section: Previous Workmentioning
confidence: 99%
“…The original paper [2] was followed by a flurry of activity, e.g. improved analyses [3]- [8], code modifications [9]- [11], decoder modifications [12]- [14] and various generalizations [15]- [18]. The advantage of bias-based versus deterministic codes is that they can achieve the asymptotically optimal relationship ∝ c 2 between the sufficient code length and the coalition size c.…”
Section: Introductionmentioning
confidence: 99%
“…We have shown how the asymptotic capacity for the RDM [4] follows as a limiting case of the CDM. In the general case, C CDM q,∞ can be expressed as the solution of a min-max game (13) where the payoff function is the trace of the metric induced by the mapping γ from √ p α -space to √ g w -space. The CDM parameters r and t 1 , · · · , t q give rise to a constraint g = M h on g which prevents the application of the solution method of [4].…”
Section: Discussionmentioning
confidence: 99%
“…[3,5,9,10,11,13,14,16,17,18,19]), users are found to be innocent or guilty via an 'accusation sum', a sum of weighted persegment contributions, computed for each user separately. The analysis of achievable performance was greatly helped by the onset of an information-theoretic treatment of anti-collusion codes.…”
Section: Asymptotic Channel Capacitymentioning
confidence: 99%