A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Sequential and dynamic frameproof codes
2007
Designs, Codes and Cryptography
In this paper we extend the properties of frameproof codes to this dynamic model, defining and constructing both l-sequential frameproof codes and l-dynamic c-frameproof codes. ...
The concept of traitor tracing has been applied to a digital broadcast setting in the form of dynamic traitor-tracing schemes and sequential traitor-tracing schemes, which could be used to combat piracy ...
Acknowledgements I would like to thank Simon Blackburn and Peter Wild for helpful discussions on this topic. ...
doi:10.1007/s10623-006-9037-2
fatcat:bwv2dpgwprg65no2hch2jvr6rm
Sliding-window dynamic frameproof codes
2006
Designs, Codes and Cryptography
In this paper we formally define sliding-window dynamic frameproof codes and provide optimal constructions for a certain class of these schemes. ...
A sliding-window dynamic frameproof code is a scheme for discouraging the piracy of digital broadcasts through the use of digital fingerprinting. ...
Acknowledgements I'd like to thank Simon Blackburn and Peter Wild for their comments on this material, the Commonwealth Scholarship Commission and EPSRC for their support, and the anonymous reviewers for ...
doi:10.1007/s10623-006-9030-9
fatcat:ezu5kqqdbrbvphfoicvq7qgfse
Sequential Traitor Tracing
[chapter]
2000
Lecture Notes in Computer Science
We obtain the convergence time of these schemes and show that the scheme based on error correcting codes has a convergence time which is the same as the best known result for dynamic schemes. ...
We consider the same scenario as Fiat and Tassa and propose a new type of traceability scheme, called sequential traitor tracing, that can efficiently detect all traitors and does not require any real-time ...
We also showed that sequential traceability schemes are closely related to frameproof codes and so constructions from frameproof codes can be used for sequential schemes. ≤ H(V (j) 1 , · · · , V (j) i− ...
doi:10.1007/3-540-44598-6_20
fatcat:4gzldvcfkneqnjk4a2z2jhdbs4
Survey on Decentralized Fingerprinting Solutions: Copyright Protection through Piracy Tracing
2020
Computers
After analyzing those solutions, a discussion is carried out to highlight the properties and the limitations of those techniques. ...
The paper reviews recent digital fingerprinting solutions that are available for two particularly relevant scenarios: peer-to-peer distribution networks and broadcasting. ...
Consequently, we invite the data hiding and the multimedia security research communities to address this research topic and explore new solutions to face this very demanding challenge. ...
doi:10.3390/computers9020026
fatcat:xonziwqjzzdkbkmlrqhpcdt4cm
PSUM: Peer-to-peer multimedia content distribution using collusion-resistant fingerprinting
2016
Journal of Network and Computer Applications
The security of PSUM is ensured by using an asymmetric fingerprinting protocol based on collusion-resistant codes. ...
The paper presents a thorough performance analysis of PSUM, through different experiments and simulations, and also analyzes several security compromising attacks and countermeasures. ...
Acknowledgment This work was partly funded by the Spanish Government through grants TIN2011-27076-C03-02 "CO-PRIVACY" and TIN2014-57364-C2-2-R "SMARTGLACIS". ...
doi:10.1016/j.jnca.2016.03.007
fatcat:fnb5f3f4rvdmfkqwmxklkk2l54
A fully collusion resistant broadcast, trace, and revoke system
2006
Proceedings of the 13th ACM conference on Computer and communications security - CCS '06
We introduce a simple primitive called Augmented Broadcast Encryption (ABE) that is sufficient for constructing broadcast encryption, traitor-tracing, and trace-and-revoke systems. ...
We then construct a secure ABE system for which the resulting concrete trace-and-revoke system has ciphertexts and private keys of size √ N where N is the total number of users in the system. ...
Stinson, and Ruizhong Wei. Combinatorial properties of
frameproof and traceability codes. Cryptology ePrint 2000/004, 2000.
[33] D. Stinson and R. Wei. ...
doi:10.1145/1180405.1180432
dblp:conf/ccs/BonehW06
fatcat:f5i3extfhrg2rlr4zqbor7nveq
Efficient Traitor Tracing Algorithms Using List Decoding
[chapter]
2001
Lecture Notes in Computer Science
We use powerful new techniques for list decoding errorcorrecting codes to efficiently trace traitors. ...
The authors thank Gui-Leng Feng, Tom Høholdt, Ralf Kötter, and Madhu Sudan for useful conversations. ...
These searches can be run in parallel or sequentially. ...
doi:10.1007/3-540-45682-1_11
fatcat:nepsczcfpzctdd57r4stwlndpm
Robust watermarking scheme based on the JPEG2000 standard
2005
Journal of Electronic Imaging (JEI)
Furthermore, the proposed watermarking scheme can be also upgraded to be used as a fingerprinting scheme once the embedded mark is properly coded, due to the use of a collusion scheme. ...
column removal, and a combination of rotation, cropping and scaling. ...
The user thereof uses the information at its sole risk and liability. ...
doi:10.1117/1.1988334
fatcat:hvdnjfhtmzgdpckbmbqcsbxwuq
Page 1684 of Mathematical Reviews Vol. 31, Issue Index
[page]
Mathematical Reviews
(Andrea Sgarro) 99m:94032 94A60 (05B05, 05B15)
— (with Wei, Ruizhong) Combinatorial properties and constructions of traceability schemes and frameproof codes. (English summary) SIAM J. ...
(see 99d:68011) 05C85 (68R10)
— (with Abbas, Nesrine) Clustering bipartite and chordal graphs: complexity, sequential and parallel algorithms. (English summary) Discrete Appl. ...
Page 2764 of Mathematical Reviews Vol. , Issue Subject Index
[page]
Mathematical Reviews
(with Stinson, Douglas R.; Wei, Ruizhong) Combinatorial properties of frameproof and traceability codes. ...
(English summary) 2002f:94043
Schellwat, Holger see Bierbrauer, Jiirgen, 2002a:94020 and 2002i:94035
Schmitz, Roland Use of chaotic dynamical systems in cryptography. ...
Page 2005 of Mathematical Reviews Vol. , Issue Index
[page]
Mathematical Reviews
(with Sarkar, Palash) Frameproof and IPP codes. (English summary) Progress in cryptology—INDOCRYPT 2001 (Chennai), 117-126, Lecture Notes in Comput. Sci., 2247, Springer, Berlin, 2001. ...
(Hideki Yamasaki) 2003g:68071 68Q45 (68Q85, 94A45)
— (with Fernau, Henning) Sequential grammars and automata with valences. (English summary) Theoret. Comput. Sci. 276 (2002), no. 1-2, 377-405. ...
Page 1886 of Mathematical Reviews Vol. , Issue Author Index
[page]
Mathematical Reviews
(Summary) 2002h:94054 94A60
— (with Stinson, Douglas R.; Wei, Ruizhong) Combinatorial properties of frameproof and traceability codes. (English summary) /EEE Trans. Inform. ...
K.) m-equivalence, entropy and F -dynamical systems. (English summary) Fuzzy Sets and Systems 121 (2001), no. 2, 275-283. ...
Fault Tolerance in Cryptographic Applications Using Cover-Free Families
2019
As an example, we can use encryption, message authentication codes, and digital signatures to help us guarantee the privacy, integrity, and authenticity of data that is stored and/or transmitted. ...
Many cryptographical solutions have a Boolean outcome, for example, the message is either authentic and accepted as it is, or it is not and so it needs to be rejected/re-transmitted. ...
of modifications on signed documents and redactable signatures [10] , broadcast authentication [17] , broadcast encryption [7] , frameproof and traceability codes [18, 20] , among others [13] . ...
doi:10.20381/ruor-23915
fatcat:5awt3fmy4vhkpkyumogd24lrvm
Traitor Tracing with Optimal Transmission Rate
[chapter]
Lecture Notes in Computer Science
Their solution is based on collusion-secure fingerprint codes [BS98,Tar03] and its parameters are summarized in Figure 1 . ...
The work of [PST06] describes a traitor tracing scheme with constant (but not optimal) transmission rate and (full) public traceability based on Identifiable Parent Property (IPP) codes. ...
Stinson and R. Wei, Combinatorial Properties and Constructions of Traceability Schemes and Frameproof Codes, SIAM Journal on Discrete Mathematics 11 (1998), no. 1, 41-53. SW03. R. Safavi-Naini and Y. ...
doi:10.1007/978-3-540-75496-1_5
fatcat:e4p652p4mne67kab6njbbs5bra