An Asymmetric Fingerprinting Scheme based on Tardos Codes - Inria - Institut national de recherche en sciences et technologies du numérique Accéder directement au contenu
Communication Dans Un Congrès Année : 2011

An Asymmetric Fingerprinting Scheme based on Tardos Codes

Résumé

Asymmetric fingerprinting protocols are designed to prevent an untrustworthy Provider incriminating an innocent Buyer. These protocols enable the Buyer to generate their own fingerprint by themself, and ensure that the Provider never has access to the Buyer's copy of the Work. Until recently, such protocols were not practical because the collusion-resistant codes they rely on were too long. However, the advent of Tardos codes means that the probabilistic collusion-resistant codes are now sufficiently short that asymmetric fingerprint codes should, in theory, be practical. Unfortunately, previous asymmetric fingerprinting protocols cannot be directly applied to Tardos codes, because generation of the Tardos codes depends on a secret vector that is only known to the Provider. This knowledge allows an untrustworthy Provider to attack traditional asymmetric fingerprinting protocols. We describe this attack, and then propose a new asymmetric fingerprinting protocol, specifically designed for Tardos codes.
Fichier principal
Vignette du fichier
Asym_Tardos8.pdf (378.22 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)
Loading...

Dates et versions

inria-00581156 , version 1 (26-09-2013)
inria-00581156 , version 2 (24-04-2017)

Identifiants

  • HAL Id : inria-00581156 , version 1

Citer

Ana Charpentier, Caroline Fontaine, Teddy Furon, Ingemar Cox. An Asymmetric Fingerprinting Scheme based on Tardos Codes. Information Hiding, May 2011, Prague, Czech Republic. ⟨inria-00581156v1⟩

Collections

IRISA-D5
644 Consultations
370 Téléchargements

Partager

Gmail Facebook X LinkedIn More