Filters








14 Hits in 1.3 sec

Sequential and dynamic frameproof codes

Maura Paterson
2007 Designs, Codes and Cryptography  
In this paper we extend the properties of frameproof codes to this dynamic model, defining and constructing both l-sequential frameproof codes and l-dynamic c-frameproof codes.  ...  The concept of traitor tracing has been applied to a digital broadcast setting in the form of dynamic traitor-tracing schemes and sequential traitor-tracing schemes, which could be used to combat piracy  ...  Acknowledgements I would like to thank Simon Blackburn and Peter Wild for helpful discussions on this topic.  ... 
doi:10.1007/s10623-006-9037-2 fatcat:bwv2dpgwprg65no2hch2jvr6rm

Sliding-window dynamic frameproof codes

Maura Paterson
2006 Designs, Codes and Cryptography  
In this paper we formally define sliding-window dynamic frameproof codes and provide optimal constructions for a certain class of these schemes.  ...  A sliding-window dynamic frameproof code is a scheme for discouraging the piracy of digital broadcasts through the use of digital fingerprinting.  ...  Acknowledgements I'd like to thank Simon Blackburn and Peter Wild for their comments on this material, the Commonwealth Scholarship Commission and EPSRC for their support, and the anonymous reviewers for  ... 
doi:10.1007/s10623-006-9030-9 fatcat:ezu5kqqdbrbvphfoicvq7qgfse

Sequential Traitor Tracing [chapter]

Reihaneh Safavi-Naini, Yejing Wang
2000 Lecture Notes in Computer Science  
We obtain the convergence time of these schemes and show that the scheme based on error correcting codes has a convergence time which is the same as the best known result for dynamic schemes.  ...  We consider the same scenario as Fiat and Tassa and propose a new type of traceability scheme, called sequential traitor tracing, that can efficiently detect all traitors and does not require any real-time  ...  We also showed that sequential traceability schemes are closely related to frameproof codes and so constructions from frameproof codes can be used for sequential schemes. ≤ H(V (j) 1 , · · · , V (j) i−  ... 
doi:10.1007/3-540-44598-6_20 fatcat:4gzldvcfkneqnjk4a2z2jhdbs4

Survey on Decentralized Fingerprinting Solutions: Copyright Protection through Piracy Tracing

David Megías, Minoru Kuribayashi, Amna Qureshi
2020 Computers  
After analyzing those solutions, a discussion is carried out to highlight the properties and the limitations of those techniques.  ...  The paper reviews recent digital fingerprinting solutions that are available for two particularly relevant scenarios: peer-to-peer distribution networks and broadcasting.  ...  Consequently, we invite the data hiding and the multimedia security research communities to address this research topic and explore new solutions to face this very demanding challenge.  ... 
doi:10.3390/computers9020026 fatcat:xonziwqjzzdkbkmlrqhpcdt4cm

PSUM: Peer-to-peer multimedia content distribution using collusion-resistant fingerprinting

Amna Qureshi, David Megías, Helena Rifà-Pous
2016 Journal of Network and Computer Applications  
The security of PSUM is ensured by using an asymmetric fingerprinting protocol based on collusion-resistant codes.  ...  The paper presents a thorough performance analysis of PSUM, through different experiments and simulations, and also analyzes several security compromising attacks and countermeasures.  ...  Acknowledgment This work was partly funded by the Spanish Government through grants TIN2011-27076-C03-02 "CO-PRIVACY" and TIN2014-57364-C2-2-R "SMARTGLACIS".  ... 
doi:10.1016/j.jnca.2016.03.007 fatcat:fnb5f3f4rvdmfkqwmxklkk2l54

A fully collusion resistant broadcast, trace, and revoke system

Dan Boneh, Brent Waters
2006 Proceedings of the 13th ACM conference on Computer and communications security - CCS '06  
We introduce a simple primitive called Augmented Broadcast Encryption (ABE) that is sufficient for constructing broadcast encryption, traitor-tracing, and trace-and-revoke systems.  ...  We then construct a secure ABE system for which the resulting concrete trace-and-revoke system has ciphertexts and private keys of size √ N where N is the total number of users in the system.  ...  Stinson, and Ruizhong Wei. Combinatorial properties of frameproof and traceability codes. Cryptology ePrint 2000/004, 2000. [33] D. Stinson and R. Wei.  ... 
doi:10.1145/1180405.1180432 dblp:conf/ccs/BonehW06 fatcat:f5i3extfhrg2rlr4zqbor7nveq

Efficient Traitor Tracing Algorithms Using List Decoding [chapter]

Alice Silverberg, Jessica Staddon, Judy L. Walker
2001 Lecture Notes in Computer Science  
We use powerful new techniques for list decoding errorcorrecting codes to efficiently trace traitors.  ...  The authors thank Gui-Leng Feng, Tom Høholdt, Ralf Kötter, and Madhu Sudan for useful conversations.  ...  These searches can be run in parallel or sequentially.  ... 
doi:10.1007/3-540-45682-1_11 fatcat:nepsczcfpzctdd57r4stwlndpm

Robust watermarking scheme based on the JPEG2000 standard

Julià Minguillón
2005 Journal of Electronic Imaging (JEI)  
Furthermore, the proposed watermarking scheme can be also upgraded to be used as a fingerprinting scheme once the embedded mark is properly coded, due to the use of a collusion scheme.  ...  column removal, and a combination of rotation, cropping and scaling.  ...  The user thereof uses the information at its sole risk and liability.  ... 
doi:10.1117/1.1988334 fatcat:hvdnjfhtmzgdpckbmbqcsbxwuq

Page 1684 of Mathematical Reviews Vol. 31, Issue Index [page]

Mathematical Reviews  
(Andrea Sgarro) 99m:94032 94A60 (05B05, 05B15) — (with Wei, Ruizhong) Combinatorial properties and constructions of traceability schemes and frameproof codes. (English summary) SIAM J.  ...  (see 99d:68011) 05C85 (68R10) — (with Abbas, Nesrine) Clustering bipartite and chordal graphs: complexity, sequential and parallel algorithms. (English summary) Discrete Appl.  ... 

Page 2764 of Mathematical Reviews Vol. , Issue Subject Index [page]

Mathematical Reviews  
(with Stinson, Douglas R.; Wei, Ruizhong) Combinatorial properties of frameproof and traceability codes.  ...  (English summary) 2002f:94043 Schellwat, Holger see Bierbrauer, Jiirgen, 2002a:94020 and 2002i:94035 Schmitz, Roland Use of chaotic dynamical systems in cryptography.  ... 

Page 2005 of Mathematical Reviews Vol. , Issue Index [page]

Mathematical Reviews  
(with Sarkar, Palash) Frameproof and IPP codes. (English summary) Progress in cryptology—INDOCRYPT 2001 (Chennai), 117-126, Lecture Notes in Comput. Sci., 2247, Springer, Berlin, 2001.  ...  (Hideki Yamasaki) 2003g:68071 68Q45 (68Q85, 94A45) — (with Fernau, Henning) Sequential grammars and automata with valences. (English summary) Theoret. Comput. Sci. 276 (2002), no. 1-2, 377-405.  ... 

Page 1886 of Mathematical Reviews Vol. , Issue Author Index [page]

Mathematical Reviews  
(Summary) 2002h:94054 94A60 — (with Stinson, Douglas R.; Wei, Ruizhong) Combinatorial properties of frameproof and traceability codes. (English summary) /EEE Trans. Inform.  ...  K.) m-equivalence, entropy and F -dynamical systems. (English summary) Fuzzy Sets and Systems 121 (2001), no. 2, 275-283.  ... 

Fault Tolerance in Cryptographic Applications Using Cover-Free Families

Thais Bardini Idalino, University, My, University, My
2019
As an example, we can use encryption, message authentication codes, and digital signatures to help us guarantee the privacy, integrity, and authenticity of data that is stored and/or transmitted.  ...  Many cryptographical solutions have a Boolean outcome, for example, the message is either authentic and accepted as it is, or it is not and so it needs to be rejected/re-transmitted.  ...  of modifications on signed documents and redactable signatures [10] , broadcast authentication [17] , broadcast encryption [7] , frameproof and traceability codes [18, 20] , among others [13] .  ... 
doi:10.20381/ruor-23915 fatcat:5awt3fmy4vhkpkyumogd24lrvm

Traitor Tracing with Optimal Transmission Rate [chapter]

Nelly Fazio, Antonio Nicolosi, Duong Hieu Phan
Lecture Notes in Computer Science  
Their solution is based on collusion-secure fingerprint codes [BS98,Tar03] and its parameters are summarized in Figure 1 .  ...  The work of [PST06] describes a traitor tracing scheme with constant (but not optimal) transmission rate and (full) public traceability based on Identifiable Parent Property (IPP) codes.  ...  Stinson and R. Wei, Combinatorial Properties and Constructions of Traceability Schemes and Frameproof Codes, SIAM Journal on Discrete Mathematics 11 (1998), no. 1, 41-53. SW03. R. Safavi-Naini and Y.  ... 
doi:10.1007/978-3-540-75496-1_5 fatcat:e4p652p4mne67kab6njbbs5bra