Abstract
We improve on the Boneh-Shaw Fingerprinting scheme in two ways: (i) We merge a Direct Sequence Spread Spectrum (DSSS) em- bedding layer with the first Boneh-Shaw layer (the so called “Γ code”), effectively increasing the protected object size by about four orders of magnitude. As a result we have more than one order of magnitude impro- vement on the size of collusions that we can overcome. (ii) We replace the “marking assumption” with a more realistic assumption, allowing random jamming on the so called “unseen” bits.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
N. Alon, J.H. Spencer, and P. Erdös The Probabilistic Method, Wiley Interscience, ISBN 0-471-53588-5
Josh Benaloh, Private Communication.
D. Boneh, Shaw: Collusion Secure Fingerprinting for Digital Data, by D. Boneh, and J. Shaw. IEEE Transactions on Information Theory, Vol 44, No. 5, pp. 1897–1905, 1998. Extended abstract in Proceedings of Crypto’ 95, Lecture Notes in Computer Science, Vol. 963, Springer-Verlag, pp. 452–465, 1995.
Chor, Fiat, Naor: Traitor Tracing, Crypto’94, Yvo Desmedt Ed., pp.257–270; Springer-Verlag LNCS 839.
A. Fiat and T. Tassa: Dynamic Traitor Tracing, Proc. Crypto’99, pp. 354–371, Michael Wiener Ed., Springer-Verlag LNCS 1666.
O. Goldreich: On the Foundations of Modern Cryptography, Proc. Crypto 97. pp. 46–74, Burton S. Kaliski Ed., Springer-Verlag LNCS 1294.
Funda Ergun, Joe Kilian, and Ravi Kumar: A Note on the Limits of Collusion-Resistant Watermarks, Proc. Eurocrypt’99, Springer Verlag LNCS 1592, 1999, J. Stern Ed.
Rajeev Motwani and Prabhakar Raghavan: Randomized Algorithms, Cambridge U. press, 1995, ISBN 0 521 47465 5
J. Van Leeuwen: Handbook of Theoretical Computer Science, Vol. A, Algorithms and Complexity, MIT Press.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yacobi, Y. (2001). Improved Boneh-Shaw Content Fingerprinting. In: Naccache, D. (eds) Topics in Cryptology — CT-RSA 2001. CT-RSA 2001. Lecture Notes in Computer Science, vol 2020. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45353-9_28
Download citation
DOI: https://doi.org/10.1007/3-540-45353-9_28
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-41898-6
Online ISBN: 978-3-540-45353-6
eBook Packages: Springer Book Archive