Optimal probabilistic fingerprint codes
From MaRDI portal
Publication:5901096
DOI10.1145/780542.780561zbMath1192.94127OpenAlexW2131267390MaRDI QIDQ5901096
Publication date: 16 August 2010
Published in: Proceedings of the thirty-fifth annual ACM symposium on Theory of computing (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1145/780542.780561
Linear codes (general theory) (94B05) Bounds on codes (94B65) Authentication, digital signatures and secret sharing (94A62)
Related Items (29)
Traceable secret sharing and applications ⋮ Equal-Weight Fingerprinting Codes ⋮ Traceable PRFs: Full Collusion Resistance and Active Security ⋮ Black-box Trace\&Revoke codes ⋮ Tracing a linear subspace: application to linearly-homomorphic group signatures ⋮ Generalization of IPP codes and IPP set systems ⋮ Traceability codes and their generalizations ⋮ Accusation probabilities in Tardos codes: beyond the Gaussian approximation ⋮ Tracing quantum state distinguishers via backtracking ⋮ Optimal symmetric Tardos traitor tracing schemes ⋮ An Improvement of Tardos’s Collusion-Secure Fingerprinting Codes with Very Short Lengths ⋮ Signature codes for weighted noisy adder channel, multimedia fingerprinting and compressed sensing ⋮ Existence and construction of complete traceability multimedia fingerprinting codes resistant to averaging attack and adversarial noise ⋮ Binary and \(q\)-ary Tardos codes, revisited ⋮ False negative probabilities in Tardos codes ⋮ On the Effects of Pirate Evolution on the Design of Digital Content Distribution Systems ⋮ Sequential Monte Carlo for rare event estimation ⋮ Fully collusion-resistant traitor tracing scheme with shorter ciphertexts ⋮ Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys ⋮ Tracing Malicious Proxies in Proxy Re-encryption ⋮ An improvement of discrete Tardos fingerprinting codes ⋮ Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes ⋮ Improved versions of Tardos' fingerprinting scheme ⋮ Traitors Collaborating in Public: Pirates 2.0 ⋮ Efficient Traitor Tracing from Collusion Secure Codes ⋮ Collusion resistant watermarkable PRFs from standard assumptions ⋮ New techniques for traitor tracing: size \(N^{1/3}\) and more from pairings ⋮ False positive probabilities in \(q\)-ary Tardos codes: comparison of attacks ⋮ The Complexity of Differential Privacy
This page was built for publication: Optimal probabilistic fingerprint codes