Collusion-secure fingerprinting for digital data

From MaRDI portal
Publication:4701165

DOI10.1109/18.705568zbMath0931.94051OpenAlexW2134195444MaRDI QIDQ4701165

Dan Boneh, James R. Shaw

Publication date: 21 November 1999

Published in: IEEE Transactions on Information Theory (Search for Journal in Brave)

Full work available at URL: https://semanticscholar.org/paper/60e3d93bbb5b6707b38115608b1dfe430a4b6206




Related Items

Almost Optimal Cover-Free FamiliesSeparating Hash Families: A Johnson-type bound and New ConstructionsSeparation and WitnessesEqual-Weight Fingerprinting CodesOn differential privacy and adaptive data analysis with bounded spaceNonoverlapping convex polytopes with vertices in a Boolean cube and other problems in coding theoryThe average sensitivity of an intersection of half spacesAn Improvement of Tardos’s Collusion-Secure Fingerprinting Codes with Very Short Lengths2-secure codes from 2-SFP codesBinary \(B_2\)-sequences: a new upper boundA new kind of selectors and their applications to conflict resolution in wireless multichannels networksThe sample complexity of revenue maximizationOptimal competitive auctionsHomological product codesA quantum algorithm for computing the unit group of an arbitrary degree number fieldPrimal beats dual on online packing LPs in the random-order modelCompetitive algorithms from competitive equilibriaMinimum bisection is fixed parameter tractableAn efficient parallel solver for SDD linear systemsSolving SDD linear systems in nearly m log 1/2 n timeFrom hierarchical partitions to hierarchical coversShortest paths on polyhedral surfaces and terrainsEmbedding and canonizing graphs of bounded genus in logspaceTesting surface area with arbitrary accuracyCoin flipping of any constant bias implies one-way functionsInfinite randomness expansion with a constant number of devicesFrom average case complexity to improper learning complexityBandits with switching costsOnline local learning via semidefinite programmingHow to use indistinguishability obfuscationHow to delegate computationsCircuits resilient to additive attacks with applications to secure computationOn the existence of extractable one-way functionsBlack-box non-black-box zero knowledgeDichotomies in equilibrium computation, and complementary pivot algorithms for a new class of non-separable utility functionsQuery complexity of approximate nash equilibriaConstant rank bimatrix games are PPAD-hardApproximation algorithms for bipartite matching with metric and geometric costsDistributed approximation algorithms for weighted shortest pathsParallel algorithms for geometric graph problemsFourier PCA and robust tensor decompositionSmoothed analysis of tensor decompositionsEfficient density estimation via piecewise polynomial approximationAnalytical approach to parallel repetitionA characterization of strong approximation resistanceA strongly polynomial algorithm for generalized flow maximizationApproximate distance oracles with constant query timeFaster all-pairs shortest paths via circuit complexitySublinear-time decremental algorithms for single-source reachability and shortest paths on directed graphsZig-zag sortCommunity detection thresholds and the weak Ramanujan propertyDistributed computability in Byzantine asynchronous systemsMultiway cut, pairwise realizable distributions, and descending thresholdsCluster before you hallucinateApproximation algorithms for regret-bounded vehicle routing and applications to distance-constrained vehicle routingImproved approximation algorithms for degree-bounded network design problems with node connectivity requirementsEvery list-decodable code for high noise has abundant near-optimal rate puncturingsNon-malleable codes from additive combinatoricsBreaking the quadratic barrier for 3-LCC's over the realsOptimal error rates for interactive coding IThe asymptotic k-SAT thresholdSatisfiability threshold for random regular NAE-SATEfficient deterministic approximate counting for low-degree polynomial threshold functionsCommunication lower bounds via critical block sensitivityComputing with a full memoryHitting sets for multilinear read-once algebraic branching programs, in any orderList decoding for a multiple access hyperchannelStrongly separable codesA TTP-independent watermarking protocol based on commutative cryptosystem for copyright protection in e-commerceLocalized image watermarking based on feature points of scale-space representationAlmost separating and almost secure frameproof codes over \(q\)-ary alphabetsBounds and constructions for \(\overline{3}\)-separable codes with length 3Inapproximability for Antiferromagnetic Spin Systems in the Tree Nonuniqueness RegionCommunication is Bounded by Root of RankAre Lock-Free Concurrent Algorithms Practically Wait-Free?Robust Protocols for Securely Expanding Randomness and Distributing Keys Using Untrusted Quantum DevicesThe Power of Localization for Efficiently Learning Linear Separators with NoiseSliding-window dynamic frameproof codesSequential and dynamic frameproof codesOn optimal codes with \(w\)-identifiable parent propertyExplicit constructions of separating hash families from algebraic curves over finite fieldsFingerprinting Codes and the Price of Approximate Differential PrivacyUnnamed ItemNew upper bounds for parent-identifying codes and traceability codesOn Symmetric Designs and Binary 3-Frameproof CodesA simple fingerprinting scheme for large user groupsImproved bounds for separating hash families\((2,1)\)-separating systems beyond the probabilistic boundMultimedia IPP codes with efficient tracingOn tight bounds for binary frameproof codesGeneralization of IPP codes and IPP set systemsTraceability codes and their generalizationsAccusation probabilities in Tardos codes: beyond the Gaussian approximationRFID authentication efficient proactive information security within computational securityBounds and constructions for \(\overline {3}\)-strongly separable codes with length 3Bounds for separating hash familiesSuper-Polylogarithmic Hypergraph Coloring Hardness via Low-Degree Long CodesAn Almost-Optimally Fair Three-Party Coin-Flipping ProtocolOptimal CUR Matrix DecompositionsEXPONENTIAL IMPROVEMENT IN PRECISION FOR SIMULATING SPARSE HAMILTONIANSEfficient construction of provably secure steganography under ordinary covert channelsGeneralized hashing and parent-identifying codes.Wide-sense 2-frameproof codesImproved upper bounds for parent-identifying set systems and separable codesAC-RRNS: anti-collusion secured data sharing scheme for cloud storageSignature codes for weighted noisy adder channel, multimedia fingerprinting and compressed sensingNew algorithms and lower bounds for circuits with linear threshold gatesExistence and construction of complete traceability multimedia fingerprinting codes resistant to averaging attack and adversarial noiseNew bounds on \(\bar{2}\)-separable codes of length 2Binary and \(q\)-ary Tardos codes, revisitedFalse negative probabilities in Tardos codesOn the Effects of Pirate Evolution on the Design of Digital Content Distribution SystemsDeciding First-Order Properties of Nowhere Dense GraphsThe Matching Polytope has Exponential Extension ComplexityConstructions of almost secure frameproof codes with applications to fingerprinting schemesOn traceability property of equidistant codesAsymptotically optimal \(\overline {2}\)-separable codes with length 4On generalized separating hash familiesCover-free codes and separating system codesSymmetric disjunctive list-decoding codesNew bounds on 2-frameproof codes of length 4Bounds on the rate of separating codesA tight bound for frameproof codes viewed in terms of separating hash familiesImproved bounds on 2-frameproof codes with length 4On 2-parent-identifying set systems of block size 4Binary fingerprinting codesEconomic efficiency requires interactionFully collusion-resistant traitor tracing scheme with shorter ciphertextsRecursive constructions of secure codes and hash families using difference function families.Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private KeysNew constructions for IPP codesConstructions and bounds for separating hash familiesAn improvement of discrete Tardos fingerprinting codesAnswering $n^2+o(1)$ Counting Queries with Differential Privacy is HardSeparable collusion-secure multimedia codesSymmetric Tardos fingerprinting codes for arbitrary alphabet sizesImproved versions of Tardos' fingerprinting schemeA class of I.P.P. codes with efficient identificationDistributing hash families with few rowsCollusion resistant watermarkable PRFs from standard assumptionsFingerprinting codes and the price of approximate differential privacyAnalyze gaussPrivate matchings and allocationsRounding sum-of-squares relaxationsConstant factor approximation for balanced cut in the PIE modelEntropy, optimization and countingPolynomial bounds for the grid-minor theoremAn excluded half-integral grid theorem for digraphs and the directed disjoint paths problemCops, robbers, and threatening skeletonsPseudorandom generators with optimal seed length for non-boolean poly-size circuitsOn derandomizing algorithms that err extremely rarelySuper-polynomial lower bounds for depth-4 homogeneous arithmetic formulasLower bounds for depth 4 formulas computing iterated matrix multiplicationThe limits of depth reduction for arithmetic formulasA super-polynomial lower bound for regular arithmetic formulasA characterization of locally testable affine-invariant properties via decomposition theoremsL p -testingTurnstile streaming algorithms might as well be linear sketchesLinear time construction of compressed text indices in compact spaceFormulas vs. circuits for small distance connectivityToward better formula lower boundsBreaking the minsky-papert barrier for constant-depth circuitsFalse positive probabilities in \(q\)-ary Tardos codes: comparison of attacksThe Complexity of Differential PrivacyAnonymous trace and revokeA study of the separating property in Reed-Solomon codes by bounding the minimum distance