A general conversion method of fingerprint codes to (more) robust fingerprint codes against bit erasure

研究成果: Chapter in Book/Report/Conference proceedingConference contribution

4 被引用数 (Scopus)

抄録

A c-secure fingerprint code is called robust if it is secure against a limited number of bit erasure in undetectable positions in addition to usual collusion attacks. In this article, we propose the first general conversion method of (non-robust) c-secure codes to robust c-secure codes. It is also applicable to amplify robustness of given robust c-secure codes. By applying our conversion to c-secure codes given by Nuida et al. (AAECC 2007), we present robust c-secure codes with code lengths of order Θ(c2 log 2 c) with respect to c. The code length improves preceding results by Sirvent (WCC 2007) and by Boneh and Naor (ACM CCS 2008) and is close to the one by Billet and Phan (ICITS 2008), where our result is based on a weaker assumption than those preceding results. As an application, the use of the resulting code in construction by Boneh and Naor also improves their traitor tracing scheme against imperfect decoders in efficiency of key sizes and pirate tracing procedure.

本文言語英語
ホスト出版物のタイトルInformation Theoretic Security - 4th International Conference, ICITS 2009, Revised Selected Papers
ページ194-212
ページ数19
DOI
出版ステータス出版済み - 2010
外部発表はい
イベント4th International Conference on Information Theoretic Security, ICITS 2009 - Shizuoka, 日本
継続期間: 12 3 200912 6 2009

出版物シリーズ

名前Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
5973 LNCS
ISSN(印刷版)0302-9743
ISSN(電子版)1611-3349

会議

会議4th International Conference on Information Theoretic Security, ICITS 2009
国/地域日本
CityShizuoka
Period12/3/0912/6/09

All Science Journal Classification (ASJC) codes

  • 理論的コンピュータサイエンス
  • コンピュータ サイエンス(全般)

フィンガープリント

「A general conversion method of fingerprint codes to (more) robust fingerprint codes against bit erasure」の研究トピックを掘り下げます。これらがまとまってユニークなフィンガープリントを構成します。

引用スタイル