Skip to main content

Obtaining Asymptotic Fingerprint Codes Through a New Analysis of the Boneh-Shaw Codes

  • Conference paper
Information Security and Cryptology (Inscrypt 2006)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4318))

Included in the following conference series:

  • 745 Accesses

Abstract

A fingerprinting code is a set of codewords that are embedded in each copy of a digital object with the purpose of making each copy unique. If the fingerprinting code is c-secure with ε error, then the decoding of a pirate word created by a coalition of at most c dishonest users, will expose at least one of the guilty parties with probability 1–ε.

The Boneh-Shaw fingerprinting codes are n-secure codes with ε error, where n also denotes the number of authorized users. Unfortunately, the length the Boneh-Shaw codes should be of order O(n 3log(n/ε)), which is prohibitive for practical applications. In this paper, we prove that the Boneh-Shaw codes are (c< n)-secure for lengths of order O(nc 2log(n/ε)).

Moreover we show how to use these codes to construct binary fingerprinting codes with length L=O(c 6logc logn), with probability of error O(1/n)=exp(–Ω(L)), and identification algorithm of complexity poly(logn)=poly(L). These results improve in some aspects the best known schemes and with a much more simple construction.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Barg, A., Blakey, G.R., Kabatiansky, G.A.: Digital fingerprinting codes: Problem statements, constructions, identification of traitors. IEEE Trans. Inform. Theory 49(4), 852–865 (2003)

    Article  MATH  MathSciNet  Google Scholar 

  2. Boneh, D., Shaw, J.: Collusion-secure fingerprinting for digital data. IEEE Trans. Inform. Theory 44(95), 1897–1905 (1998)

    Article  MATH  MathSciNet  Google Scholar 

  3. Forney, G.: Concatenated codes. MIT Press, Cambridge (1966)

    Google Scholar 

  4. Guruswami, V., Sudan, M.: Improved decoding of Reed-Solomon codes and algebraic geometry codes. IEEE Trans. Inform. Theory 45(6), 1757–1767 (1999)

    Article  MATH  MathSciNet  Google Scholar 

  5. Hoeffding, W.: Probability inequalities for sums of bounded random variables. J. Amer. Statist. Assoc. 58(301), 13–30 (1963)

    Article  MATH  MathSciNet  Google Scholar 

  6. Tardos, G.: Optimal probabilistic fingerprint codes. In: Proceedings of the 35th Annual ACM Symposium on Theory of Computing, pp. 116–125 (2003)

    Google Scholar 

  7. Tsfasman, M., Vlăduţ, S.: Algebraic-geometric codes. Kluwer, Dordrecht (1991)

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Fernandez, M., Cotrina, J. (2006). Obtaining Asymptotic Fingerprint Codes Through a New Analysis of the Boneh-Shaw Codes. In: Lipmaa, H., Yung, M., Lin, D. (eds) Information Security and Cryptology. Inscrypt 2006. Lecture Notes in Computer Science, vol 4318. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11937807_23

Download citation

  • DOI: https://doi.org/10.1007/11937807_23

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-49608-3

  • Online ISBN: 978-3-540-49610-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics