A general conversion method of fingerprint codes to (more) robust fingerprint codes against bit erasure

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

Abstract

A c-secure fingerprint code is called robust if it is secure against a limited number of bit erasure in undetectable positions in addition to usual collusion attacks. In this article, we propose the first general conversion method of (non-robust) c-secure codes to robust c-secure codes. It is also applicable to amplify robustness of given robust c-secure codes. By applying our conversion to c-secure codes given by Nuida et al. (AAECC 2007), we present robust c-secure codes with code lengths of order Θ(c2 log 2 c) with respect to c. The code length improves preceding results by Sirvent (WCC 2007) and by Boneh and Naor (ACM CCS 2008) and is close to the one by Billet and Phan (ICITS 2008), where our result is based on a weaker assumption than those preceding results. As an application, the use of the resulting code in construction by Boneh and Naor also improves their traitor tracing scheme against imperfect decoders in efficiency of key sizes and pirate tracing procedure.

Original languageEnglish
Title of host publicationInformation Theoretic Security - 4th International Conference, ICITS 2009, Revised Selected Papers
Pages194-212
Number of pages19
DOIs
Publication statusPublished - 2010
Externally publishedYes
Event4th International Conference on Information Theoretic Security, ICITS 2009 - Shizuoka, Japan
Duration: Dec 3 2009Dec 6 2009

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume5973 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference4th International Conference on Information Theoretic Security, ICITS 2009
Country/TerritoryJapan
CityShizuoka
Period12/3/0912/6/09

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'A general conversion method of fingerprint codes to (more) robust fingerprint codes against bit erasure'. Together they form a unique fingerprint.

Cite this