Robust fingerprinting codes: a near optimal construction

Fingerprinting codes, originally designed for embedding traceable fingerprints in digital content, have many applications in cryptography; most notably, they are used to construct traitor tracing systems. Recently there has been some interest in constructing <i>robust</i> fingerprinting codes: codes capable of tracing words even when the pirate adversarially destroys a δ fraction of the marks in the fingerprint. An early construction due to Boneh and Naor produces codewords whose length is proportional to <i>c</i><sup>4</sup>/(1-δ)<sup>2</sup> where <i>c</i> is the number of words at the adversary's disposal. Recently Nuida developed a scheme with codewords of length proportional to (<i>c</i> log <i>c</i>)<sup>2</sup>/(1-δ) <sup>2</sup>. In this paper we introduce a new technique for constructing codes whose length is proportional to (<i>c</i> log <i>c</i>)<sup>2</sup>/(1-δ), which is asymptotically optimal up to logarithmic factors. These new codes lead to traitor tracing systems with constant size ciphertext and asymptotically shorter secret keys than previously possible.

[1]  Amos Fiat,et al.  Dynamic Traitor Training , 1999, CRYPTO.

[2]  Abhi Shelat,et al.  Lower bounds for collusion-secure fingerprinting , 2003, SODA '03.

[3]  Serdar Pehlivanoglu,et al.  Tracing and Revoking Pirate Rebroadcasts , 2009, ACNS.

[4]  Brent Waters,et al.  A fully collusion resistant broadcast, trace, and revoke system , 2006, CCS '06.

[5]  Tamir Tassa,et al.  Improved versions of Tardos’ fingerprinting scheme , 2008, Des. Codes Cryptogr..

[6]  Moni Naor,et al.  Threshold Traitor Tracing , 1998, CRYPTO.

[7]  Amos Fiat,et al.  Dynamic Traitor Tracing , 2001, Journal of Cryptology.

[8]  B. E. Eckbo,et al.  Appendix , 1826, Epilepsy Research.

[9]  Matthew K. Franklin,et al.  An Efficient Public Key Traitor Tracing Scheme , 1999, CRYPTO.

[10]  Dan Collusion-Secure Fingerprinting for Digital Data , 2002 .

[11]  Tamir Tassa,et al.  Low Bandwidth Dynamic Traitor Tracing Schemes , 2005, Journal of Cryptology.

[12]  Birgit Pfitzmann,et al.  Error- and Collusion-Secure Fingerprinting for Digital Data , 1999, Information Hiding.

[13]  M. Kasahara,et al.  A New Traitor Tracing , 2002, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[14]  Brent Waters,et al.  Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys , 2006, EUROCRYPT.

[15]  Stefan Katzenbeisser,et al.  Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes , 2008, Des. Codes Cryptogr..

[16]  Douglas R. Stinson,et al.  Key Preassigned Traceability Schemes for Broadcast Encryption , 1998, Selected Areas in Cryptography.

[17]  Gábor Tardos,et al.  High rate fingerprinting codes and the fingerprinting capacity , 2009, SODA.

[18]  Yevgeniy Dodis,et al.  Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack , 2003, Public Key Cryptography.

[19]  Tamir Tassa,et al.  Improved efficiency for revocation schemes via Newton interpolation , 2006, TSEC.

[20]  Koji Nuida,et al.  A General Conversion Method of Fingerprint Codes to (More) Robust Fingerprint Codes against Bit Erasure , 2009, ICITS.

[21]  David Pointcheval,et al.  Public Traceability in Traitor Tracing Schemes , 2005, EUROCRYPT.

[22]  Douglas R. Stinson,et al.  Combinatorial Properties and Constructions of Traceability Schemes and Frameproof Codes , 1998, SIAM J. Discret. Math..

[23]  Duong Hieu Phan,et al.  Traitor Tracing with Optimal Transmission Rate , 2007, ISC.

[24]  Aggelos Kiayias,et al.  Traitor Tracing with Constant Transmission Rate , 2002, EUROCRYPT.

[25]  Yvo Desmedt,et al.  Optimum Traitor Tracing and Asymmetric Schemes , 1998, EUROCRYPT.

[26]  Reihaneh Safavi-Naini,et al.  Sequential Traitor Tracing , 2000, CRYPTO.

[27]  Reihaneh Safavi-Naini,et al.  New traitor tracing schemes using bilinear map , 2003, DRM '03.

[28]  Hideki Imai,et al.  An Improvement of Tardos's Collusion-Secure Fingerprinting Codes with Very Short Lengths , 2007, AAECC.

[29]  Amos Fiat,et al.  Tracing traitors , 2000, IEEE Trans. Inf. Theory.

[30]  Jirí Sgall,et al.  Efficient dynamic traitor tracing , 2000, SODA '00.

[31]  Jessica Staddon,et al.  Efficient Methods for Integrating Traceability and Broadcast Encryption , 1999, CRYPTO.

[32]  Olivier Billet,et al.  Efficient Traitor Tracing from Collusion Secure Codes , 2008, ICITS.

[33]  Gábor Tardos,et al.  Optimal probabilistic fingerprint codes , 2003, STOC '03.

[34]  Moni Naor,et al.  Efficient trace and revoke schemes , 2000, International Journal of Information Security.

[35]  Jessica Staddon,et al.  Efficient Traitor Tracing Algorithms Using List Decoding , 2001, ASIACRYPT.

[36]  Jessica Staddon,et al.  Combinatorial properties of frameproof and traceability codes , 2001, IEEE Trans. Inf. Theory.

[37]  Moni Naor,et al.  Revocation and Tracing Schemes for Stateless Receivers , 2001, CRYPTO.

[38]  Thomas Sirvent Traitor tracing scheme with constant ciphertext rate against powerful pirates , 2006, IACR Cryptol. ePrint Arch..

[39]  Moni Naor,et al.  Traitor tracing with constant size ciphertext , 2008, CCS.