TY - JOUR
T1 - Optimal symmetric Tardos traitor tracing schemes
AU - Laarhoven, T.M.M.
AU - Weger, de, B.M.M.
PY - 2014
Y1 - 2014
N2 - For the Tardos traitor tracing scheme, we show that by combining the symbol-symmetric accusation function of Škoric et al. with the improved analysis of Blayer and Tassa we get further improvements. Our construction gives codes that are up to four times shorter than Blayer and Tassa’s, and up to two times shorter than the codes from Škoric et al. Asymptotically, we achieve the theoretical optimal codelength for Tardos’ distribution function and the symmetric score function. For large coalitions, our codelengths are asymptotically about 4.93% of Tardos’ original codelengths, which also improves upon results from Nuida et al.
Keywords: Traitor tracing schemes; Fingerprinting codes; Watermarking
AB - For the Tardos traitor tracing scheme, we show that by combining the symbol-symmetric accusation function of Škoric et al. with the improved analysis of Blayer and Tassa we get further improvements. Our construction gives codes that are up to four times shorter than Blayer and Tassa’s, and up to two times shorter than the codes from Škoric et al. Asymptotically, we achieve the theoretical optimal codelength for Tardos’ distribution function and the symmetric score function. For large coalitions, our codelengths are asymptotically about 4.93% of Tardos’ original codelengths, which also improves upon results from Nuida et al.
Keywords: Traitor tracing schemes; Fingerprinting codes; Watermarking
U2 - 10.1007/s10623-012-9718-y
DO - 10.1007/s10623-012-9718-y
M3 - Article
SN - 0925-1022
VL - 71
SP - 83
EP - 103
JO - Designs, Codes and Cryptography
JF - Designs, Codes and Cryptography
IS - 1
ER -