• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations | Disambiguate

Optimal symmetric Tardos traitor tracing schemes. Designs, Codes and Cryptography, (2012)

by T Laarhoven, B de Weger
Add To MetaCart

Tools

Sorted by:
Results 1 - 10 of 15
Next 10 →

Dynamic Tardos Traitor Tracing Schemes

by Thijs Laarhoven, Jeroen Doumen, Peter Roelse, Benne De Weger , et al. , 2011
"... ..."
Abstract - Cited by 8 (7 self) - Add to MetaCart
Abstract not found
(Show Context)

Citation Context

...on two in particular: the improved analysis done by Blayer and Tassa [2]; and the introduction of a symmetric score function by Škorić et al. [9]. Laarhoven and De Weger combined these improvements =-=[6]-=- to get even shorter codelength constants. For c0 ≥ 2 and η ≤ 1, this construction gives codelengths of ` < 24c20 ln(n/ε1), with the constant further decreasing as c0 increases or η decreases. For asy...

A Capacity-Achieving Simple Decoder for Bias-Based Traitor Tracing Schemes

by Jan-jaap Oosterwijk, Jeroen Doumen
"... Abstract—We investigate alternative suspicion functions for bias-based traitor tracing schemes, and present a practical construction of a simple decoder that attains capacity in the limit of large coalition size c. We derive optimal suspicion functions in both the Restricted-Digit Model and the Comb ..."
Abstract - Cited by 7 (2 self) - Add to MetaCart
Abstract—We investigate alternative suspicion functions for bias-based traitor tracing schemes, and present a practical construction of a simple decoder that attains capacity in the limit of large coalition size c. We derive optimal suspicion functions in both the Restricted-Digit Model and the Combined-Digit Model. These functions depend on information that is usually not available to the tracer – the attack strategy or the tallies of the symbols received by the colluders. We discuss how such results can be used in realistic contexts. We study several combinations of coalition attack strategy versus suspicion function optimized against some attack (another attack or the same). In many of these combinations the usual codelength scaling ℓ ∝ c 2 changes to a lower power of c, e.g. c 3/2. We find that the interleaving strategy is an especially powerful attack. The suspicion function tailored against interleaving is the key ingredient of the capacity-achieving construction. Index Terms—Collusion resistance, traitor tracing. I.

Dynamic traitor tracing for arbitrary alphabets: divide and conquer

by Thijs Laarhoven, Jan-jaap Oosterwijk, Jeroen Doumen - In IEEE Workshop on Information Forensics and Security (WIFS , 2012
"... ar ..."
Abstract - Cited by 7 (7 self) - Add to MetaCart
Abstract not found
(Show Context)

Citation Context

...eving codelengths ℓ = 100c2⌈ln(n/ε1)⌉. This scheme is widely known as the Tardos scheme. Several papers [2, 13, 14] then showed how the constant 100 can be further reduced, and Laarhoven and De Weger =-=[10]-=- finally showed how to achieve the optimal codelength of the binary symmetric Tardos scheme, given by ℓ = (pi 2 2 +O(c −1/3))c2 ln(n/ε1). Building upon this optimal static Tardos scheme, Laarhoven et ...

Efficient probabilistic group testing based on traitor tracing

by Thijs Laarhoven - In preparation , 2013
"... Abstract — Inspired by recent results from collusion-resistant traitor tracing, we provide a framework for constructing efficient probabilistic group testing schemes. In the traditional group testing model, our scheme asymptotically requires T ∼ 2K lnN tests to find (with high probability) the corre ..."
Abstract - Cited by 4 (3 self) - Add to MetaCart
Abstract — Inspired by recent results from collusion-resistant traitor tracing, we provide a framework for constructing efficient probabilistic group testing schemes. In the traditional group testing model, our scheme asymptotically requires T ∼ 2K lnN tests to find (with high probability) the correct set of K defectives out of N items. The framework is also applied to several noisy group testing and threshold group testing models, often leading to improvements over previously known results, but we emphasize that this framework can be applied to other variants of the classical model as well, both in adaptive and in non-adaptive settings. I.
(Show Context)

Citation Context

... constant factor. Later research focused on establishing the exact (asymptotic) lower bound [18], which turned out to be T & 2K2 lnN , and decreasing the upper bounds by improving Tardos’ scheme [5], =-=[19]-=-, [25], [28], which eventually lead to an asymptotic bound of T ∼ 12pi2K2 ln(N/ε). b) Dynamic (adaptive) traitor tracing: While the above results are based on the static setting where the assignment o...

Tuple decoders for traitor tracing schemes

by Jan-jaap Oosterwijk , Jeroen Doumen , Thijs Laarhoven , 2014
"... In the field of collusion-resistant traitor tracing, Oosterwijk et al. recently determined the optimal suspicion function for simple decoders. Earlier, Moulin also considered another type of decoder: the generic joint decoder that compares all possible coalitions, and showed that usually the generic ..."
Abstract - Cited by 2 (2 self) - Add to MetaCart
In the field of collusion-resistant traitor tracing, Oosterwijk et al. recently determined the optimal suspicion function for simple decoders. Earlier, Moulin also considered another type of decoder: the generic joint decoder that compares all possible coalitions, and showed that usually the generic joint decoder outperforms the simple decoder. Both Amiri and Tardos, and Meerwald and Furon described constructions that assign suspicion levels to c-tuples, where c is the number of colluders. We investigate a novel idea: the tuple decoder, assigning a suspicion level to tuples of a fixed size. In contrast to earlier work, we use this in a novel accusation algorithm to decide for each distinct user whether or not to accuse him. We expect such a scheme to outperform simple decoders while not being as computationally intensive as the generic joint decoder. In this paper we generalize the optimal suspicion functions to tuples, and describe a family of accusation algorithms in this setting that accuses individual users using this tuple-based information.

Riding the Saddle Point: asymptotics of the capacity-achieving simple decoder for bias-based traitor tracing

by Sarah Ibrahimi , Boris Škorić, et al.
"... ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
Abstract not found

Dynamic Traitor Tracing Schemes, Revisited

by Thijs Laarhoven , 2014
"... We revisit recent results from the area of collusion-resistant traitor tracing, and show how they can be combined and im-proved to obtain more efficient dynamic traitor tracing schemes. In particular, we show how the dynamic Tardos scheme of Laarhoven et al. can be combined with the optimized score ..."
Abstract - Cited by 2 (2 self) - Add to MetaCart
We revisit recent results from the area of collusion-resistant traitor tracing, and show how they can be combined and im-proved to obtain more efficient dynamic traitor tracing schemes. In particular, we show how the dynamic Tardos scheme of Laarhoven et al. can be combined with the optimized score functions of Oosterwijk et al. to trace coalitions much faster. If the attack strategy is known, in many cases the order of the code length goes down from quadratic to linear in the number of colluders, while if the attack is not known, we show how the interleaving defense may be used to catch all colluders about twice as fast as in the dynamic Tardos scheme. Some of these results also apply to the static traitor tracing setting where the attack strategy is known in advance, and to group testing. 1

Discrete distributions in the Tardos scheme, revisited

by Thijs Laarhoven , Benne De Weger - In 1st ACM Workshop on Information Hiding and Multimedia Security (IH&amp;MMSec , 2013
"... ABSTRACT The Tardos scheme is a well-known traitor tracing scheme to protect copyrighted content against collusion attacks. The original scheme contained some suboptimal design choices, such as the score function and the distribution function used for generating the biases.Škorić et al. previously ..."
Abstract - Cited by 2 (2 self) - Add to MetaCart
ABSTRACT The Tardos scheme is a well-known traitor tracing scheme to protect copyrighted content against collusion attacks. The original scheme contained some suboptimal design choices, such as the score function and the distribution function used for generating the biases.Škorić et al. previously showed that a symbol-symmetric score function leads to shorter codes, while Nuida et al. obtained the optimal distribution functions for arbitrary coalition sizes. Later, Nuida et al. showed that combining these results leads to even shorter codes when the coalition size is small. We extend their analysis to the case of large coalitions and prove that these optimal distributions converge to the arcsine distribution, thus showing that the arcsine distribution is asymptotically optimal in the symmetric Tardos scheme. We also present a new, practical alternative to the discrete distributions of Nuida et al. and give a comparison of the estimated lengths of the fingerprinting codes for each of these distributions.
(Show Context)

Citation Context

...he Tardos scheme has the optimal order codelength. Over the last ten years, improvements to the Tardos scheme have lead to a significant decrease in the codelength parameters d`. We previously showed =-=[5]-=- that combining the symbol-symmetric score function of Škorić et al. [10] with the improved analysis of Blayer and Tassa [2] leads to codelength parameters of the order d` ≈ 4.93 for large c. For sm...

Binary and q-ary Tardos codes, revisited

by Boris Skorić, Jan-Jaap Oosterwijk
"... The Tardos code is a much studied collusion-resistant fingerprinting code, with the special property that it has asymptotically optimal length m ∝ c 2 0, where c0 is the number of colluders. In this paper we simplify the security proofs for this code, making use of the Bernstein inequality and Benne ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
The Tardos code is a much studied collusion-resistant fingerprinting code, with the special property that it has asymptotically optimal length m ∝ c 2 0, where c0 is the number of colluders. In this paper we simplify the security proofs for this code, making use of the Bernstein inequality and Bennett inequality instead of the typically used Markov inequality. This simplified proof technique also slightly improves the tightness of the bound on the false negative error probability. We present new results on code length optimization, for both small and asymptotically large coalition sizes.

Asymptotic fingerprinting capacity in the Combined Digit Model

by Dion Boesten, Boris Skorić , 2012
"... We study the channel capacity of q-ary fingerprinting in the limit of large attacker coalitions. We extend known results by considering the Combined Digit Model, an attacker model that captures signal processing attacks such as averaging and noise addition. For q = 2 we give results for various atta ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
We study the channel capacity of q-ary fingerprinting in the limit of large attacker coalitions. We extend known results by considering the Combined Digit Model, an attacker model that captures signal processing attacks such as averaging and noise addition. For q = 2 we give results for various attack parameter settings. For q ≥ 3 we present the relevant equations without providing a solution. We show how the channel capacity in the Restricted Digit Model is obtained as a limiting case of the Combined Digit Model.
(Show Context)

Citation Context

... Such attack models were proposed in [19] and [17] for general q, and for q = 2 in e.g. [7, 8]. 1.2 Asymptotic channel capacity In Tardos’ scheme [15] and later improvements and generalisations (e.g. =-=[3, 5, 9, 10, 11, 13, 14, 16, 17, 18, 19]-=-), users are found to be innocent or guilty via an ‘accusation sum’, a sum of weighted persegment contributions, computed for each user separately. The analysis of achievable performance was greatly h...

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University