On Collusion Security of Random Codes(Biometrics)(<Special Section>Cryptography and Information Security)
スポンサーリンク
概要
- 論文の詳細を見る
Fingerprinting is a technique to add identifying marks to each copy of digital contents in order to enhance traceability to a distribution system. Collusion attacks, in which the attackers collect two or more fingerprinted copies and try to generate an untraceable copy, are considered to be a threat for the fingerprinting system. With the aim of enhancing collusion security to the fingerprinting system, several collusion secure codes, such as c-frameproof code, c-secure frameproof code and c-identifiable parent property code, have been proposed. Here, c indicates the maximum number of colluding users. However, a practical construction of the above codes is still an issue because of the tight restrictions originated from their combinatorial properties. In this paper, we introduce an evaluation of frameproof, secure frameproof, and identifiable parent property by the probability that a code has the required property. Then, we focus on random codes. For frameproof and secure frameproof properties, we estimate the average probability that random codes have the required property where the probability is taken over the random construction of codes and random construction of coalitions. For the estimation, we assume the uniform distribution of symbols of random codes and the symbols that the coalitions hold. Therefore, we clarify the adequacy of the assumptions by comparison with numerical results. The estimates and numerical results resemble, which implies the adequacy of the assumption at least in the range of the experiment.
- 社団法人電子情報通信学会の論文
- 2005-01-01
著者
-
Shikata J
The Graduate School Of Environment And Information Sciences Yokohama National University
-
Matsumoto T
Yokohama National Univ. Yokohama‐shi Jpn
-
Matsumoto Tsutomu
The Graduate School Of Engineering Yokohama National University:(present Addoress)graduate School Of
-
YOSHIOKA Katsunari
the Graduate School of Environment and Information Sciences, Yokohama National University
-
SHIKATA Junji
the Graduate School of Environment and Information Sciences, Yokohama National University
-
Yoshioka K
The Graduate School Of Environment And Information Sciences Yokohama National University
関連論文
- 招待講演 nicter: An Incident Analysis System for the Global Internet using Correlation between Network Monitoring and Malware Analysis
- 招待講演 nicter: An Incident Analysis System for the Global Internet using Correlation between Network Monitoring and Malware Analysis
- Fine-Grain Feature Extraction from Malware's Scan Behavior Based on Spectrum Analysis
- Malware Sandbox Analysis for Secure Observation of Vulnerability Exploitation
- Automated Malware Analysis System and Its Sandbox for Revealing Malware's Internal and External Activities
- Practical Correlation Analysis between Scan and Malware Profiles against Zero-Day Attacks Based on Darknet Monitoring
- Shared Pseudo-Random Secret Generation Protocols (Special Section on Discrete Mathematics and Its Applications)
- Efficient and Secure Multiparty Generation of Digital Signatures Based on Discrete Logarithms (Special Section on Discrete Mathematics and Its Applications)
- Unconditionally Secure Authenticated Encryption(Discrete Mathematics and Its Applications)
- Efficient Unconditionally Secure Digital Signatures (Asymmetric Cipher) (Cryptography and Information Security)
- A Traitor Traceable Conference System with Dynamic Sender(Special Section on Cryptography and Information Security)
- Efficient Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code
- Realizing the Menezes-Okamoto-Vanstone (MOV) Reduction Efficiently for Ordinary Elliptic Curves
- Rivulet : An Anonymous Communication Method Based on Group Communication(Special Section on Cryptography and Information Security)
- The Role of Arbiters for Unconditionally Secure Authentication(Discrete Mathematics and Its Applications)
- Information-Theoretically Secure Key Insulated Encryption : Models, Bounds and Constructions(Cryptography and Information Security)(Information Theory and Its Applications)
- On Collusion Security of Random Codes(Biometrics)(Cryptography and Information Security)
- Collusion Secure Codes : Systematic Security Definitions and Their Relations(Discrete Mathematics and Its Applications)
- Clone Match Rate Evaluation for an Artifact-metric System (特集:新たな脅威に立ち向かうコンピュータセキュリティ技術)
- A Framework to Evaluate Security and Cost of Time Stamping Schemes(Special Section on Cryptography and Information Security)
- Random-Error-Resilient Tracing Algorithm for a Collusion-Secure Fingerprinting Code (特集 電子社会に向けたコンピュータセキュリティ技術)
- An Empirical Evaluation of an Unpacking Method Implemented with Dynamic Binary Instrumentation