TY - GEN
T1 - An error-tolerant variant of a short 2-secure fingerprint code and its security evaluation
AU - Nuida, Koji
N1 - Funding Information:
This work was supported by 2007 Research Grants of the Science and Technology Foundation of Japan (JSTF).
PY - 2009
Y1 - 2009
N2 - In recent research on collusion-secure fingerprint codes, some relaxation of the conventional security assumption (Marking Assumption) have been introduced from a viewpoint of reality in practical situations, and several fingerprint codes have been proposed under those assumptions. In this article, we consider such a relaxed assumption and give an extension of short 2-secure codes (under Marking Assumption) recently proposed by Nuida et al. (IEICE Trans. A, 2009) to our assumption. We perform theoretical and numerical evaluation of security and required code lengths. For example, to bound the error probability by 0.01% for 10,000 users, 162-bit, 220-bit and 329-bit lengths are sufficient even if each bit of the fingerprint codeword is either flipped (in addition to other collusion attacks) with probabilities 1%, 2.5% and 5%, respectively, or erased with probabilities 2%, 5% and 10%, respectively.
AB - In recent research on collusion-secure fingerprint codes, some relaxation of the conventional security assumption (Marking Assumption) have been introduced from a viewpoint of reality in practical situations, and several fingerprint codes have been proposed under those assumptions. In this article, we consider such a relaxed assumption and give an extension of short 2-secure codes (under Marking Assumption) recently proposed by Nuida et al. (IEICE Trans. A, 2009) to our assumption. We perform theoretical and numerical evaluation of security and required code lengths. For example, to bound the error probability by 0.01% for 10,000 users, 162-bit, 220-bit and 329-bit lengths are sufficient even if each bit of the fingerprint codeword is either flipped (in addition to other collusion attacks) with probabilities 1%, 2.5% and 5%, respectively, or erased with probabilities 2%, 5% and 10%, respectively.
UR - http://www.scopus.com/inward/record.url?scp=77956310468&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=77956310468&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-04846-3_10
DO - 10.1007/978-3-642-04846-3_10
M3 - Conference contribution
AN - SCOPUS:77956310468
SN - 3642048455
SN - 9783642048456
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 140
EP - 157
BT - Advances in Information and Computer Security - 4th International Workshop on Security, IWSEC 2009, Proceedings
T2 - 4th International Workshop on Security, IWSEC 2009
Y2 - 28 October 2009 through 30 October 2009
ER -