Abstract
For fingerprinting for digital data and traitor tracing, several collusion secure codes have been proposed to enhance resilience against collusion attacks. Although the combinatorial relationships among some codes have already been discussed, there are still unrevealed relationships because of the inconsistency of the marking assumptions for the fingerprinting systems for which the codes are proposed. In this paper, we show systematic treatment of collusion secure codes. Namely, we formally define various marking assumptions suitable for most of the fingerprinting systems. Also, we show new relationships among the combined notions of codes and the assumptions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Boneh, D., Shaw, J.: Collusion-secure fingerprinting for digital data. IEEE Transactions on Information Theory 44, 1897–1905 (1998)
Chor, B., Fiat, A., Naor, M.: Tracing traitors. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 480–491. Springer, Heidelberg (1994)
Guth, H., Pfitzmann, B.: Error- and collusion-secure fingerprinting for digital data. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768. Springer, Heidelberg (2000)
Hollmann, H.D.L., van Lint, J.H., Linnartz, J.-P., Tolhuizen, L.M.G.M.: On codes with the identifiable parent property. Journal of Combinatorial Theory A82, 121–133 (1998)
Muratani, H.: A collusion-secure fingerprinting code reduced by Chinese remaindering and its random-error resilience. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 303–315. Springer, Heidelberg (2001)
Orihara, S., Mizuki, T., Nishizeki, T.: New security index for digital fingerprinting and its bounds. IEICE Transactions E86-A(5), 1156–1163 (2003)
Safavi-Naini, R., Wang, Y.: Collusion secure q-ary fingerprinting for perceptual content. In: Sander, T. (ed.) DRM 2001. LNCS, vol. 2320, pp. 57–75. Springer, Heidelberg (2002)
Staddon, J.N., Stinson, D.R., Wei, R.: Combinatorial properties of frameproof and traceability codes. IEEE Transactions on Information Theory 47, 1042–1049 (2001)
Stinson, D.R., van Trung, T., Wei, R.: Secure frameproof codes, key distribution patterns, group testing algorithms and related structures. Journal of Statistical Planning and Inference 86(2), 595–617 (2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yoshioka, K., Shikata, J., Matsumoto, T. (2003). Systematic Treatment of Collusion Secure Codes: Security Definitions and Their Relations. In: Boyd, C., Mao, W. (eds) Information Security. ISC 2003. Lecture Notes in Computer Science, vol 2851. Springer, Berlin, Heidelberg. https://doi.org/10.1007/10958513_31
Download citation
DOI: https://doi.org/10.1007/10958513_31
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-20176-2
Online ISBN: 978-3-540-39981-0
eBook Packages: Springer Book Archive