Digital fingerprinting codes: problem statements, constructions, identification of traitors

We consider a general fingerprinting problem of digital data under which coalitions of users can alter or erase some bits in their copies in order to create an illegal copy. Each user is assigned a fingerprint which is a word in a fingerprinting code of size M (the total number of users) and length n. We present binary fingerprinting codes secure against size-t coalitions which enable the distributor (decoder) to recover at least one of the users from the coalition with probability of error exp(-/spl Omega/(n)) for M=exp(/spl Omega/(n)). This is an improvement over the best known schemes that provide the error probability no better than exp(-/spl Omega/(n/sup 1/2/)) and for this probability support at most exp(O(n/sup 1/2/)) users. The construction complexity of codes is polynomial in n. We also present versions of these constructions that afford identification algorithms of complexity poly(n)=polylog(M), improving over the best previously known complexity of /spl Omega/(M). For the case t=2, we construct codes of exponential size with even stronger performance, namely, for which the distributor can either recover both users from the coalition with probability 1-exp(/spl Omega/(n)), or identify one traitor with probability 1.

[1]  Gábor Simonyi,et al.  Separating Partition Systems and Locally Different Sequences , 1988, SIAM J. Discret. Math..

[2]  J. H. Lint,et al.  Algebraic-geometric codes , 1992 .

[3]  Dan Boneh,et al.  Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.

[4]  Venkatesan Guruswami,et al.  Improved decoding of Reed-Solomon and algebraic-geometry codes , 1999, IEEE Trans. Inf. Theory.

[5]  Alexander Barg,et al.  A class of I.P.P. codes with efficient identification , 2004, J. Complex..

[6]  Venkatesan Guruswami,et al.  List decoding of error correcting codes , 2001 .

[7]  S. Wei Secure Frameproof Codes, Key Distribution Patterns, Group Testing Algorithms and Related Structures , 1997 .

[8]  Jessica Staddon,et al.  Efficient Traitor Tracing Algorithms Using List Decoding , 2001, ASIACRYPT.

[9]  Jessica Staddon,et al.  Combinatorial properties of frameproof and traceability codes , 2001, IEEE Trans. Inf. Theory.

[10]  Gérard D. Cohen,et al.  A Hypergraph Approach to the Identifying Parent Property: The Case of Multiple Parents , 2001, SIAM J. Discret. Math..

[11]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[12]  Arthur D. Friedman,et al.  Universal Single Transition Time Asynchronous State Assignments , 1969, IEEE Transactions on Computers.

[13]  Amos Fiat,et al.  Tracing traitors , 2000, IEEE Trans. Inf. Theory.

[14]  Kenneth W. Shum,et al.  A low-complexity algorithm for the construction of algebraic-geometric codes better than the Gilbert-Varshamov bound , 2001, IEEE Trans. Inf. Theory.

[15]  Gérard D. Cohen,et al.  Intersecting codes and partially identifying codes , 2001, Electron. Notes Discret. Math..

[16]  Catherine A. Meadows,et al.  Fingerprinting Long Forgiving Messages , 1985, CRYPTO.

[17]  O. Antoine,et al.  Theory of Error-correcting Codes , 2022 .

[18]  Jean-Paul M. G. Linnartz,et al.  On Codes with the Identifiable Parent Property , 1998, J. Comb. Theory, Ser. A.