A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is
In this paper we extend the properties of frameproof codes to this dynamic model, defining and constructing both l-sequential frameproof codes and l-dynamic c-frameproof codes. ... The concept of traitor tracing has been applied to a digital broadcast setting in the form of dynamic traitor-tracing schemes and sequential traitor-tracing schemes, which could be used to combat piracy ... Acknowledgements I would like to thank Simon Blackburn and Peter Wild for helpful discussions on this topic. ...doi:10.1007/s10623-006-9037-2 fatcat:bwv2dpgwprg65no2hch2jvr6rm
In this paper we formally define sliding-window dynamic frameproof codes and provide optimal constructions for a certain class of these schemes. ... A sliding-window dynamic frameproof code is a scheme for discouraging the piracy of digital broadcasts through the use of digital fingerprinting. ... Acknowledgements I'd like to thank Simon Blackburn and Peter Wild for their comments on this material, the Commonwealth Scholarship Commission and EPSRC for their support, and the anonymous reviewers for ...doi:10.1007/s10623-006-9030-9 fatcat:ezu5kqqdbrbvphfoicvq7qgfse
Lecture Notes in Computer Science
We obtain the convergence time of these schemes and show that the scheme based on error correcting codes has a convergence time which is the same as the best known result for dynamic schemes. ... We consider the same scenario as Fiat and Tassa and propose a new type of traceability scheme, called sequential traitor tracing, that can efficiently detect all traitors and does not require any real-time ... We also showed that sequential traceability schemes are closely related to frameproof codes and so constructions from frameproof codes can be used for sequential schemes. ≤ H(V (j) 1 , · · · , V (j) i− ...doi:10.1007/3-540-44598-6_20 fatcat:4gzldvcfkneqnjk4a2z2jhdbs4
After analyzing those solutions, a discussion is carried out to highlight the properties and the limitations of those techniques. ... The paper reviews recent digital fingerprinting solutions that are available for two particularly relevant scenarios: peer-to-peer distribution networks and broadcasting. ... Consequently, we invite the data hiding and the multimedia security research communities to address this research topic and explore new solutions to face this very demanding challenge. ...doi:10.3390/computers9020026 fatcat:xonziwqjzzdkbkmlrqhpcdt4cm
The security of PSUM is ensured by using an asymmetric fingerprinting protocol based on collusion-resistant codes. ... The paper presents a thorough performance analysis of PSUM, through different experiments and simulations, and also analyzes several security compromising attacks and countermeasures. ... Acknowledgment This work was partly funded by the Spanish Government through grants TIN2011-27076-C03-02 "CO-PRIVACY" and TIN2014-57364-C2-2-R "SMARTGLACIS". ...doi:10.1016/j.jnca.2016.03.007 fatcat:fnb5f3f4rvdmfkqwmxklkk2l54
We introduce a simple primitive called Augmented Broadcast Encryption (ABE) that is sufficient for constructing broadcast encryption, traitor-tracing, and trace-and-revoke systems. ... We then construct a secure ABE system for which the resulting concrete trace-and-revoke system has ciphertexts and private keys of size √ N where N is the total number of users in the system. ... Stinson, and Ruizhong Wei. Combinatorial properties of frameproof and traceability codes. Cryptology ePrint 2000/004, 2000.  D. Stinson and R. Wei. ...doi:10.1145/1180405.1180432 dblp:conf/ccs/BonehW06 fatcat:f5i3extfhrg2rlr4zqbor7nveq
Lecture Notes in Computer Science
We use powerful new techniques for list decoding errorcorrecting codes to efficiently trace traitors. ... The authors thank Gui-Leng Feng, Tom Høholdt, Ralf Kötter, and Madhu Sudan for useful conversations. ... These searches can be run in parallel or sequentially. ...doi:10.1007/3-540-45682-1_11 fatcat:nepsczcfpzctdd57r4stwlndpm
Furthermore, the proposed watermarking scheme can be also upgraded to be used as a fingerprinting scheme once the embedded mark is properly coded, due to the use of a collusion scheme. ... column removal, and a combination of rotation, cropping and scaling. ... The user thereof uses the information at its sole risk and liability. ...doi:10.1117/1.1988334 fatcat:hvdnjfhtmzgdpckbmbqcsbxwuq
(Andrea Sgarro) 99m:94032 94A60 (05B05, 05B15) — (with Wei, Ruizhong) Combinatorial properties and constructions of traceability schemes and frameproof codes. (English summary) SIAM J. ... (see 99d:68011) 05C85 (68R10) — (with Abbas, Nesrine) Clustering bipartite and chordal graphs: complexity, sequential and parallel algorithms. (English summary) Discrete Appl. ...
(with Stinson, Douglas R.; Wei, Ruizhong) Combinatorial properties of frameproof and traceability codes. ... (English summary) 2002f:94043 Schellwat, Holger see Bierbrauer, Jiirgen, 2002a:94020 and 2002i:94035 Schmitz, Roland Use of chaotic dynamical systems in cryptography. ...
(with Sarkar, Palash) Frameproof and IPP codes. (English summary) Progress in cryptology—INDOCRYPT 2001 (Chennai), 117-126, Lecture Notes in Comput. Sci., 2247, Springer, Berlin, 2001. ... (Hideki Yamasaki) 2003g:68071 68Q45 (68Q85, 94A45) — (with Fernau, Henning) Sequential grammars and automata with valences. (English summary) Theoret. Comput. Sci. 276 (2002), no. 1-2, 377-405. ...
(Summary) 2002h:94054 94A60 — (with Stinson, Douglas R.; Wei, Ruizhong) Combinatorial properties of frameproof and traceability codes. (English summary) /EEE Trans. Inform. ... K.) m-equivalence, entropy and F -dynamical systems. (English summary) Fuzzy Sets and Systems 121 (2001), no. 2, 275-283. ...
As an example, we can use encryption, message authentication codes, and digital signatures to help us guarantee the privacy, integrity, and authenticity of data that is stored and/or transmitted. ... Many cryptographical solutions have a Boolean outcome, for example, the message is either authentic and accepted as it is, or it is not and so it needs to be rejected/re-transmitted. ... of modifications on signed documents and redactable signatures  , broadcast authentication  , broadcast encryption  , frameproof and traceability codes [18, 20] , among others  . ...doi:10.20381/ruor-23915 fatcat:5awt3fmy4vhkpkyumogd24lrvm
Lecture Notes in Computer Science
Their solution is based on collusion-secure fingerprint codes [BS98,Tar03] and its parameters are summarized in Figure 1 . ... The work of [PST06] describes a traitor tracing scheme with constant (but not optimal) transmission rate and (full) public traceability based on Identifiable Parent Property (IPP) codes. ... Stinson and R. Wei, Combinatorial Properties and Constructions of Traceability Schemes and Frameproof Codes, SIAM Journal on Discrete Mathematics 11 (1998), no. 1, 41-53. SW03. R. Safavi-Naini and Y. ...doi:10.1007/978-3-540-75496-1_5 fatcat:e4p652p4mne67kab6njbbs5bra