UCL logo

UCL Discovery

UCL home » Library Services » Electronic resources » UCL Discovery

An asymmetric fingerprinting scheme based on tardos codes

Charpentier, A; Fontaine, C; Furon, T; Cox, I; (2011) An asymmetric fingerprinting scheme based on tardos codes. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) , 6958 L pp. 43-58. 10.1007/978-3-642-24178-9_4.

Full text not available from this repository.


Asymmetric fingerprinting protocols are designed to prevent an untrustworthy Provider incriminating an innocent Buyer. These protocols enable the Buyer to generate their own fingerprint by themself, and ensure that the Provider never has access to the Buyer's copy of the Work. Until recently, such protocols were not practical because the collusion-resistant codes they rely on were too long. However, the advent of Tardos codes means that the probabilistic collusion-resistant codes are now sufficiently short that asymmetric fingerprint codes should, in theory, be practical. Unfortunately, previous asymmetric fingerprinting protocols cannot be directly applied to Tardos codes, because generation of the Tardos codes depends on a secret vector that is only known to the Provider. This knowledge allows an untrustworthy Provider to attack traditional asymmetric fingerprinting protocols. We describe this attack, and then propose a new asymmetric fingerprinting protocol, specifically designed for Tardos codes. © 2011 Springer-Verlag.

Type: Article
Title: An asymmetric fingerprinting scheme based on tardos codes
DOI: 10.1007/978-3-642-24178-9_4
URI: http://discovery.ucl.ac.uk/id/eprint/1363018
Downloads since deposit
Download activity - last month
Download activity - last 12 months
Downloads by country - last 12 months

Archive Staff Only

View Item View Item