Skip to main content
Log in

Improved versions of Tardos’ fingerprinting scheme

  • Published:
Designs, Codes and Cryptography Aims and scope Submit manuscript

Abstract

We study the Tardos’ probabilistic fingerprinting scheme and show that its codeword length may be shortened by a factor of approximately 4. We achieve this by retracing Tardos’ analysis of the scheme and extracting from it all constants that were arbitrarily selected. We replace those constants with parameters and derive a set of inequalities that those parameters must satisfy so that the desired security properties of the scheme still hold. Then we look for a solution of those inequalities in which the parameter that governs the codeword length is minimal. A further reduction in the codeword length is achieved by decoupling the error probability of falsely accusing innocent users from the error probability of missing all colluding pirates. Finally, we simulate the Tardos scheme and show that, in practice, one may use codewords that are shorter than those in the original Tardos scheme by a factor of at least 16.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Boneh D., Shaw J.: Collusion-secure fingerprinting for digital data. IEEE Trans. Inform. Theory 44(5), 1897–1905 (1998). See also Proceedings of the Crypto 95. Springer LNCS, vol. 963, pp. 452–465 (1995).

    Google Scholar 

  2. Chor B., Fiat A., Naor M.: Tracing traitors. In: Proceedings of the Crypto 94. Springer LNCS, vol. 839, pp. 257–270 (1994). For a full version see [3].

  3. Chor, B., Fiat, A., Naor, M., Pinkas, B.: Tracing traitors. IEEE Trans. Inform. Theory 46(3), 893–910 (2000)

    Article  MATH  Google Scholar 

  4. Cox I.J., Kilian J., Leighton T., Shamoon T.: A secure, robust watermark for multimedia. In: Information Hiding. Springer LNCS, vol. 174, pp. 185–226 (1996).

  5. Fiat A., Tassa T.: Dynamic traitor tracing. J Cryptol. 14(3), 211–223 (2001). See also Proceedings of the Crypto 99. Springer LNCS, vol. 1666, pp. 537–554 (1999).

    Google Scholar 

  6. Tardos G.: Optimal probabilistic fingerprint codes. In: Proceedings of the 35th ACM Symposium on Theory of Computing, STOC’03. ACM, pp. 116–125.

  7. Tardos G.: Optimal probabilistic fingerprint codes. J. ACM (to appear). Available also in http://www.renyi.hu/tardos/fingerprint.ps.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tamir Tassa.

Additional information

Communicated by H. Wang.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Blayer, O., Tassa, T. Improved versions of Tardos’ fingerprinting scheme. Des. Codes Cryptogr. 48, 79–103 (2008). https://doi.org/10.1007/s10623-008-9200-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10623-008-9200-z

Keywords

AMS Classification

Navigation