{"title":"Fighting three pirates with scattering codes","authors":"H. G. Schaathun","doi":"10.1109/ISIT.2004.1365240","DOIUrl":null,"url":null,"abstract":"Collusion-secure codes are used in digital fingerprinting and traitor tracing. Scattering codes were recently introduced by Sebe and Domingo-Ferrer (2002), and used to contstruct a family of codes allegedly collusion-secure against three pirates. We prove that their codes are insecure against optimal pirate strategies, and we present a new secure construction.","PeriodicalId":269907,"journal":{"name":"International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings.","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2004-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISIT.2004.1365240","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 9
Abstract
Collusion-secure codes are used in digital fingerprinting and traitor tracing. Scattering codes were recently introduced by Sebe and Domingo-Ferrer (2002), and used to contstruct a family of codes allegedly collusion-secure against three pirates. We prove that their codes are insecure against optimal pirate strategies, and we present a new secure construction.