Abstract. In this paper, we describe a new traitor tracing scheme which relies on Tardos ’ collusion secure codes to achieve constant size ciphertexts. Our scheme is also equipped with a black-box tracing procedure against pirates that are allowed to decrypt with some (possibly high) error rate while keeping the decoders of the lowest possible size when using collusion secure codes, namely of size proportional to the length of Tardos ’ code.
The topic of this paper is collusion resistant watermarking, a.k.a. traitor tracing, in particular b...
We investigate alternative suspicion functions for Tardos traitor tracing schemes. In the simple dec...
Abstract—We construct binary dynamic traitor tracing schemes, where the number of watermark bits nee...
International audienceThis chapter presents the problem of tracing traitors and the most efficient s...
We revisit recent results from the area of collusion-resistant traitor tracing, and show how they ca...
For the Tardos traitor tracing scheme, we show that by combining the symbol-symmetric accusation fun...
We revisit recent results from the area of collusion-resistant traitor tracing, and show how they ca...
International audienceThis paper deals with active fingerprinting a.k.a. traitor tracing where a col...
We construct binary dynamic traitor tracing schemes, where the number of watermark bits needed to tr...
International audienceThis paper proposes a major shift in the decoding of proba- bilistic Tardos tr...
The topic of this paper is collusion resistant watermarking, a.k.a. traitor tracing, in particular b...
We investigate alternative suspicion functions for Tardos traitor tracing schemes. In the simple dec...
Abstract—We construct binary dynamic traitor tracing schemes, where the number of watermark bits nee...
International audienceThis chapter presents the problem of tracing traitors and the most efficient s...
We revisit recent results from the area of collusion-resistant traitor tracing, and show how they ca...
For the Tardos traitor tracing scheme, we show that by combining the symbol-symmetric accusation fun...
We revisit recent results from the area of collusion-resistant traitor tracing, and show how they ca...
International audienceThis paper deals with active fingerprinting a.k.a. traitor tracing where a col...
We construct binary dynamic traitor tracing schemes, where the number of watermark bits needed to tr...
International audienceThis paper proposes a major shift in the decoding of proba- bilistic Tardos tr...
The topic of this paper is collusion resistant watermarking, a.k.a. traitor tracing, in particular b...
We investigate alternative suspicion functions for Tardos traitor tracing schemes. In the simple dec...
Abstract—We construct binary dynamic traitor tracing schemes, where the number of watermark bits nee...