Private asymmetric fingerprinting : a protocol with optimal traitor tracing using Tardos codes - Inria - Institut national de recherche en sciences et technologies du numérique Accéder directement au contenu
Communication Dans Un Congrès Année : 2014

Private asymmetric fingerprinting : a protocol with optimal traitor tracing using Tardos codes

Résumé

Active fingerprinting schemes were originally invented to deter malicious users from illegally releasing an item, such as a movie or an image. To achieve this, each time an item is released, a different fingerprint is embedded in it. If the fingerprint is created from an anti-collusion code, the fingerprinting scheme can trace colluding buyers who forge fake copies of the item using their own legitimate copies. Charpentier, Fontaine, Furon and Cox were the first to propose an asymmetric fingerprinting scheme based on Tardos codes, the most efficient anti-collusion codes known to this day. However, their work focuses on security but does not preserve the privacy of buyers. To address this issue, we introduce the first privacy-preserving asymmetric fingerprinting protocol based on Tardos codes. This protocol is optimal with respect traitor tracing. We also formally define the properties of correctness, anti-framing, traitor tracing, as well as buyer- and item-unlinkability. Finally, we prove that our protocol achieves theseproperties and give exact bounds for each of them.
Fichier non déposé

Dates et versions

hal-01090053 , version 1 (02-12-2014)

Identifiants

  • HAL Id : hal-01090053 , version 1

Citer

Caroline Fontaine, Sébastien Gambs, Julien Lolive, Cristina Onete. Private asymmetric fingerprinting : a protocol with optimal traitor tracing using Tardos codes. Third International Conference on Cryptology and Information Security in Latin America (Latincrypt'14), Sep 2014, Florianopolis, Brazil. ⟨hal-01090053⟩
249 Consultations
0 Téléchargements

Partager

Gmail Facebook X LinkedIn More