A Family of Collusion 2-Secure Codes

We present systematic strategy for collusions attacking a fingerprinting scheme. As a particular case, this strategy shows that linear codes are not good fingerprinting codes. Based on equidistant codes, we construct a family of fingerprinting codes in which the identification of guilty users can be efficiently done using minimum distance decoding.