2014
DOI: 10.1007/s10623-014-9937-5
|View full text |Cite
|
Sign up to set email alerts
|

False positive probabilities in q-ary Tardos codes: comparison of attacks

Abstract: We investigate False Positive (FP) accusation probabilities for q-ary Tardos codes in the Restricted Digit Model. We employ a computation method recently introduced by us, to which we refer as Convolution and Series Expansion (CSE). We present a comparison of several collusion attacks on q-ary codes: majority voting, minority voting, Interleaving,μ-minimizing and Random Symbol (the q-ary equivalent of the Coin Flip strategy). The comparison is made by looking at the FP rate at approximately fixed False Negativ… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
3
0

Year Published

2015
2015
2015
2015

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(4 citation statements)
references
References 25 publications
1
3
0
Order By: Relevance
“…Each curve corresponds to tracing Z from very low (lots of users get accused: high FP and low FN) to very high (almost nobody gets accused: low FP and high FN). The order of the curves is consistent with [24]. For the given choice of parameters, the plotted Z lies outside the Gaussian regime; hence MinV is the strongest attack andμ-min is a very poor attack.…”
Section: Numerical Resultssupporting
confidence: 69%
See 2 more Smart Citations
“…Each curve corresponds to tracing Z from very low (lots of users get accused: high FP and low FN) to very high (almost nobody gets accused: low FP and high FN). The order of the curves is consistent with [24]. For the given choice of parameters, the plotted Z lies outside the Gaussian regime; hence MinV is the strongest attack andμ-min is a very poor attack.…”
Section: Numerical Resultssupporting
confidence: 69%
“…However, these arguments are not very precise. In [22][23][24] an in-depth analytical and numerical investigation of the Gaussian approximation was given in the RDM case. The approach is based on the convolution rule for characteristic functions, and on a way to express the false accusation probability as a power series expansion in the small parameter 1/ √ m. This was dubbed 'the CSE method' (Convolution and Series Expansion).…”
Section: Exact Computation Of the Error Rates Of Tardos Codesmentioning
confidence: 99%
See 1 more Smart Citation
“…In the case of position-symmetric attacks, the statistical behaviour of a score system can be understood by studying the probability distribution of single-position scores [31]- [33]. To this end we have derived the innocent-user singleposition distribution for the Oosterwijk et al score, the Laarhoven score and our new score.…”
Section: Discussionmentioning
confidence: 99%