Cryptography Reference
In-Depth Information
We also have (C out ,tk out ) ← CodeGen out (1 n ) where C out = {o 1 ,...,o n }
is an (` 2 ,n,n 1 ) outer code for which Identify out satisfies the following:
∀T 2 ⊆ [n 1 ] s.t. |T 2 |≤ w Prob[∅ * Identify out (tk out ,p out ) ⊆ T 2 ] ≥ 1−ε 2
(1.29)
where p out ∈ Q ` out is an output of any probabilistic polynomial time
Forging adversary, that is bounded by the marking assumption of Defini-
tion 1.4 , given the set of codewords (C out ) T 2 .
Let T ⊆ [n] be a traitor coalition with size less than or equal to w, and
suppose that the Forging algorithm, on input (C con ) T , outputs p ∈ Q ` 1 ·` 2
in .
According to the identification algorithm for the concatenated code, we chop
the pirate codeword p = hp 1 ,...,p ` 1 ` 2 i into ` 2 blocks of size ` 1 , and denote
the j-th block as p j = hp ` 1 (j−1)+1 ,p ` 1 (j−1)+2 ,...,p ` 1 (j−1)+` 1 i. We will prove
that Identify con returns an index from T with a failure probability at most
ε 2 + ` 2 ε 1 .
Due to the code concatenation, a user receives an inner-codeword for each
block. Hence, the traitor coalition T amounts to a different set of traitor
coalitions for each block within the formalization of inner fingerprinting code.
For each block j = 1,...,` 2 we define T j = {v ∈ [n 1 ] : ∃u ∈ T s.t. i v =
f −1 (o j )}. It further holds that p j ∈ desc((C in ) T j ).
Equation 1.28 ensures that, with a failure probability at most ε 1 , it holds
Identify in (tk in ,p j ) = ind j ∈ [n 1 ] and the symbol q j = f(i ind j ) ∈{a ∈ Q out |
∃u ∈ T s.t. a = o j }.
Summing the error probability over j ∈{1,...,` 2 } we obtain the fact that
p = hq 1 ,...,q ` 2 i∈ desc(Cout T ) with probability at least 1−` 2 ε 1 .
Finally, 1.29 ensures that Identify(tk out ,p ) ∈ T with probability at most
1−ε 2 .
The proof completes with a failure probability at most ε 2 + ` 2 ε 1 .
An example of concatenating fingerprinting codes. As the concatena-
tion asks for a fully-collusion resistant inner code, we can either employ the
Boneh-Shaw fingerprinting code (CodeGen ` BS ,Identify ` BS ) or the Tardos
fingerprinting code (CodeGen T ,Identify T ). Both of these codes are over
binary alphabets which suits the purpose of code concatenation, i.e., an in-
ner code with a smaller alphabet. On the other hand, the traceability codes
based on error correcting codes or Chor-Fiat-Naor construction can be used
in the place of the outer code. None of those combinations provides asymp-
totically good results. Still, an interesting combination is the application of
a Boneh-Shaw inner code with length ` 2 ≥ 2w 2 (w − 1) ln( 2 ε 1 ) for some pa-
rameters w,ε 1 with an outer Chor-Fiat-Naor secret fingerprinting code with
length 4w log( 2 ε ) and alphabet 2w. By choosing ε 1 =
ε
8w log(2n/ε) we can
produce a binary concatenated code that is (ε,w) identifier and has length
` = O(w 4 log( ε )(log ε +log log n)). This fingerprinting code is binary and may
 
 
Search WWH ::




Custom Search