skip to main content
10.1145/780542.780561acmconferencesArticle/Chapter ViewAbstractPublication PagesstocConference Proceedingsconference-collections
Article

Optimal probabilistic fingerprint codes

Published:09 June 2003Publication History

ABSTRACT

We construct binary codes for fingerprinting. Our codes for n users that are ε-secure against c pirates have length O(c2 log(n/ε)). This improves the codes proposed by Boneh and Shaw [3] whose length is approximately the square of this length. Our codes are probabilistic. By proving matching lower bounds we establish that the length of these codes is best within a constant factor for reasonable error probabilities. This lower bound generalizes the bound found independently by Peikert, Shelat, and Smith [10] that applies to a limited class of codes. Our results also imply that randomized fingerprint codes over a binary alphabet are as powerful as over an arbitrary alphabet, and also the equal strength of two distinct models for fingerprinting.

References

  1. G. R. Blakley, C. Meadows and G. B. Purdy, Fingerprinting long forgiving messages, Proc. of Crypto '85 Springer-Verlag Berlin, Heidelberg, 1985, pp. 180--189.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. D. Boneh and M. Franklin, An efficient public key traitor tracing scheme, Proc. of Crypto '99 Springer-Verlag, Berlin, Heidelberg, 1999, pp. 338--353.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. D. Boneh and J. Shaw, Collusion-secure fingerprinting for digital data, IEEE Transactions of Information Theory 44 (1998), 480--491.]]Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. F. Chung, R. Graham, T. Leighton, Guessing secrets, Electronic Journal of Combinatorics 8 (1), 2001.]]Google ScholarGoogle Scholar
  5. B. Chor, A. Fiat and M. Naor, Tracing traitors, Proc. of Crypto'94 LNCS 839, Springer-Verlag Berlin, Heidelberg, 1994, pp. 257--270.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. J. Guth and B. Pfitzmann, Error- and collusion-secure fingerprinting for digital data, Information Hiding (IH '99) LNCS 1768, Springer-Verlag, Berlin 2000, pp. 134--145.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. J. Kilian, T. Leighton, L. Matheson, T. Shamoon, R. Tarjan, F. Zane, Resistance of digital watermarks to collusive attacks, in: Proceedings of 1998 IEEE International Symposium on Information Theory.]]Google ScholarGoogle Scholar
  8. K. Kurosawa and Y. Desmedt, Optimum traitor tracing and asymmetric schemes, Advances in cryptology---EUROCRYPT'98 LNCS 1403, Springer, Berlin, 1998, pp. 145--157.]]Google ScholarGoogle Scholar
  9. T. Lindkvist, Fingerprinting digital documents, Linköping Studies in Science and Technology, Thesis No. 798, 1999.]]Google ScholarGoogle Scholar
  10. C. Peikert, A. Shelat, A. Smith, Lower bounds for collusion-secure fingerprinting, in: Proceedings of the 14th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA) 2003.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. A. Rényi, Probability theory, North-Holland Series in Applied Mathematics and Mechanics, Vol. 10. North-Holland Publishing Co., Amsterdam, London; American Elsevier Publishing Co., Inc., New York, 1970.]]Google ScholarGoogle Scholar
  12. R. Safavi-Naini and Y. Wang, Sequential traitor tracing, Proc. of Crypto'2000, LNCS 1880, Springer-Verlag Berlin, Heidelberg, 2000, pp.316--332.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. J. N. Staddon, D. R. Stinson, R. Wei, Combinatorial properties of frameproof and traceability codes, IEEE Transactions of Information Theory 47 (2001), 1042--1049.]]Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. N. Wagner, Fingerprinting, Proc. of the 1983 IEEE Symposium on Security and Privacy (1983), pp. 18--22.]] Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Optimal probabilistic fingerprint codes

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        STOC '03: Proceedings of the thirty-fifth annual ACM symposium on Theory of computing
        June 2003
        740 pages
        ISBN:1581136749
        DOI:10.1145/780542

        Copyright © 2003 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 9 June 2003

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • Article

        Acceptance Rates

        STOC '03 Paper Acceptance Rate80of270submissions,30%Overall Acceptance Rate1,469of4,586submissions,32%

        Upcoming Conference

        STOC '24
        56th Annual ACM Symposium on Theory of Computing (STOC 2024)
        June 24 - 28, 2024
        Vancouver , BC , Canada

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader