Cryptography Reference
In-Depth Information
Pfitzmann [ 52 ], put forth that reading errors in the code may cause failure
of the system to facilitate the marking assumption. Kiayias and Yung [ 70 ],
identify marking assumption collapse in the context of traitor tracing schemes
and propose the use of all-or-nothing transforms of [ 98 ] to deal with it in
this particular context. Safavi-Naini and Wang [ 101 ] consider the problem in
terms of shortening as well as corrupting the object and present some related
constructions.
In the same context, Boneh and Naor [ 21 ] deal with this issue in traitor
tracing schemes and extend the marking assumption with the notion of δ-
robustness. This extension of the marking assumption allows the adversary to
adaptively corrupt a δ-fraction of the codeword they produce. This fraction
can account for corrupting elementary objects by padding them with elemen-
tary objects of low utility or otherwise unreadable. This relaxation gives rise
to δ-robust fingerprinting codes. An optimal up to logarithmic factors con-
struction of such codes appears in [ 20 ].
The combinatorial properties of the subclasses of fingerprinting codes that
were treated in this chapter were discussed in [ 111 ]. A number of works,
including [ 54 , 100 , 111 , 114 , 113 ], investigated further these properties and
proposed explicit constructions.
Search WWH ::




Custom Search