Paper 2014/166

Tuple decoders for traitor tracing schemes

Jan-Jaap Oosterwijk, Jeroen Doumen, and Thijs Laarhoven

Abstract

In the field of collusion-resistant traitor tracing, Oosterwijk et al. recently determined the optimal suspicion function for simple decoders. Earlier, Moulin also considered another type of decoder: the generic joint decoder that compares all possible coalitions, and showed that usually the generic joint decoder outperforms the simple decoder. Both Amiri and Tardos, and Meerwald and Furon described constructions that assign suspicion levels to $c$-tuples, where $c$ is the number of colluders. We investigate a novel idea: the tuple decoder, assigning a suspicion level to tuples of a fixed size. In contrast to earlier work, we use this in a novel accusation algorithm to decide for each distinct user whether or not to accuse him. We expect such a scheme to outperform simple decoders while not being as computationally intensive as the generic joint decoder. In this paper we generalize the optimal suspicion functions to tuples, and describe a family of accusation algorithms in this setting that accuses individual users using this tuple-based information.

Metadata
Available format(s)
PDF
Publication info
Published elsewhere. Proc. SPIE 9028, Media Watermarking, Security, and Forensics 2014, 90280C
DOI
10.1117/12.2037659
Keywords
Collusion resistancetraitor tracing
Contact author(s)
J Oosterwijk @ tue nl
History
2014-03-03: received
Short URL
https://ia.cr/2014/166
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2014/166,
      author = {Jan-Jaap Oosterwijk and Jeroen Doumen and Thijs Laarhoven},
      title = {Tuple decoders for traitor tracing schemes},
      howpublished = {Cryptology {ePrint} Archive, Paper 2014/166},
      year = {2014},
      doi = {10.1117/12.2037659},
      url = {https://eprint.iacr.org/2014/166}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.