Optimal probabilistic fingerprint codes

We construct binary codes for fingerprinting. Our codes for n users that are ε-secure against c pirates have length O(c2 log(n/ε)). This improves the codes proposed by Boneh and Shaw [3] whose length is approximately the square of this length. Our codes are probabilistic. By proving matching lower bounds we establish that the length of these codes is best within a constant factor for reasonable error probabilities. This lower bound generalizes the bound found independently by Peikert, Shelat, and Smith [10] that applies to a limited class of codes. Our results also imply that randomized fingerprint codes over a binary alphabet are as powerful as over an arbitrary alphabet, and also the equal strength of two distinct models for fingerprinting.

[1]  Amos Fiat,et al.  Dynamic Traitor Tracing , 2001, Journal of Cryptology.

[2]  Amos Fiat,et al.  Tracing traitors , 2000, IEEE Trans. Inf. Theory.

[3]  Yvo Desmedt,et al.  Optimum Traitor Tracing and Asymmetric Schemes , 1998, EUROCRYPT.

[4]  Matthew K. Franklin,et al.  An Efficient Public Key Traitor Tracing Scheme , 1999, CRYPTO.

[5]  Abhi Shelat,et al.  Lower bounds for collusion-secure fingerprinting , 2003, SODA '03.

[6]  Birgit Pfitzmann,et al.  Error- and Collusion-Secure Fingerprinting for Digital Data , 1999, Information Hiding.

[7]  Jessica Staddon,et al.  Combinatorial properties of frameproof and traceability codes , 2001, IEEE Trans. Inf. Theory.

[8]  Dan Boneh,et al.  Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.

[9]  Reihaneh Safavi-Naini,et al.  Sequential Traitor Tracing , 2000, CRYPTO.

[10]  Robert E. Tarjan,et al.  Resistance of digital watermarks to collusive attacks , 1998, Proceedings. 1998 IEEE International Symposium on Information Theory (Cat. No.98CH36252).

[11]  Tamir Tassa,et al.  Low Bandwidth Dynamic Traitor Tracing Schemes , 2005, Journal of Cryptology.

[12]  Frank Thomson Leighton,et al.  Guessing secrets , 2001, SODA '01.

[13]  Catherine A. Meadows,et al.  Fingerprinting Long Forgiving Messages , 1985, CRYPTO.

[14]  Tina Lindkvist,et al.  Fingerprinting of digital documents , 1999 .