2003
DOI: 10.1109/tit.2003.810630
|View full text |Cite
|
Sign up to set email alerts
|

Applications of list decoding to tracing traitors

Abstract: We apply results from algebraic coding theory to solve problems in cryptography, by using recent results on list decoding of error-correcting codes to efficiently find traitors who collude to create pirates. We produce schemes for which the TA (traceability) traitor tracing algorithm is very fast. We compare the TA and IPP (identifiable parent property) traitor tracing algorithms, and give evidence that when using an algebraic structure, the ability to trace traitors with the IPP algorithm implies the ability … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
73
0
4

Year Published

2004
2004
2012
2012

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 56 publications
(95 citation statements)
references
References 18 publications
2
73
0
4
Order By: Relevance
“…In practice, it takes us just a few minutes on a common desktop PC to trace large coalitions in systems having hundreds of millions of users. Our result improves the results obtained by Silverberg et al [37,38]. Our finding also applies to schemes using the same watermarking technique, such as the ones described in [23,15,16].…”
Section: Our Contributionssupporting
confidence: 88%
See 2 more Smart Citations
“…In practice, it takes us just a few minutes on a common desktop PC to trace large coalitions in systems having hundreds of millions of users. Our result improves the results obtained by Silverberg et al [37,38]. Our finding also applies to schemes using the same watermarking technique, such as the ones described in [23,15,16].…”
Section: Our Contributionssupporting
confidence: 88%
“…The overall complexity of our tracing procedures isÕ(k 2 ) which is independent of . The latter is not the case for the schemes based on algebraic codes described by Silverberg et al in [37,38].…”
Section: An Efficient Tracing Proceduresmentioning
confidence: 96%
See 1 more Smart Citation
“…In the context of multimedia fingerprinting, well-known collusion attacks are the interleaving attack (Boneh & Shaw, 1998;Fernandez & Soriano, 2004;Silverberg et al, 2003;Staddon et al, 2001) and the averaging attack (Trappe et al, 2003;Wu et al, 2004). The averaging attack is particularly effective when fingerprint's watermark is embedded into host multimedia via the spread spectrum technique.…”
Section: Introductionmentioning
confidence: 99%
“…In (Silverberg et al, 2003) and (Fernandez & Soriano, 2004), the list decoding of fingerprinting codes is used. This work assures that at least one of the colluders is identified with polynomial time complexity in the code length.…”
Section: Introductionmentioning
confidence: 99%