Presentation 2006-09-13
A Method of Shortening Tardos' Fingerprinting Code Length by Optimizing Parameters
Taichi ISOGAI, Hirofumi MURATANI, Kenichiro FURUTA,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) There is a technique called "fingerprinting" that user's IDs are embedded in digital contents to trace a traitor who distributes digital contents illegally. In fingerprinting scheme, a collusion attack that is to detect and change the differences between a content that his ID is embedded in and the another must be considered. To use a collusion secure code is a way to resist this attack, but this code has too long length to be used for practical use. Tardos show us a method of construction of a collusion secure code and a code length, but this code length is not shortest because some parameters are defined arbitrarily. We try to shorten the code length by generalize equations regarding these fixed parameter as variable ones, optimizing these parameters, evaluating the inequality exactly in a proving process of this code having robustness against a collusion attack, and evaluating numerically some inequalities that are difficult to evaluate exactly. We can show that in our method a code length of a collusion secure code can be constructed in not more than one fourth of Tardos' in the case of many colluders exist.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) fingerprinting / collusion attack / c-secure code
Paper # ISEC2006-73
Date of Issue

Conference Information
Committee ISEC
Conference Date 2006/9/6(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information Security (ISEC)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) A Method of Shortening Tardos' Fingerprinting Code Length by Optimizing Parameters
Sub Title (in English)
Keyword(1) fingerprinting
Keyword(2) collusion attack
Keyword(3) c-secure code
1st Author's Name Taichi ISOGAI
1st Author's Affiliation Corporate Research & Development Center Toshiba Corporation()
2nd Author's Name Hirofumi MURATANI
2nd Author's Affiliation Corporate Research & Development Center Toshiba Corporation
3rd Author's Name Kenichiro FURUTA
3rd Author's Affiliation Corporate Research & Development Center Toshiba Corporation
Date 2006-09-13
Paper # ISEC2006-73
Volume (vol) vol.106
Number (no) 235
Page pp.pp.-
#Pages 6
Date of Issue