Show simple item record

dc.contributor.authorMoreira, Jose
dc.contributor.authorFernández Muñoz, Marcel
dc.contributor.authorKabatiansky, Grigory
dc.contributor.otherUniversitat Politècnica de Catalunya. Departament d'Enginyeria Telemàtica
dc.date.accessioned2018-10-11T12:46:02Z
dc.date.available2018-10-11T12:46:02Z
dc.date.issued2018-04
dc.identifier.citationMoreira, J., Fernandez, M., Kabatiansky, G. Constructions of almost secure frameproof codes with applications to fingerprinting schemes. "Designs, Codes, and Cryptography", Abril 2018, vol. 86, núm. 4, p. 785-802.
dc.identifier.issn1573-7586
dc.identifier.urihttp://hdl.handle.net/2117/122239
dc.descriptionThe final publication is available at Springer via http://dx.doi.org/10.1007/s10623-017-0359-z
dc.description.abstractThis paper presents explicit constructions of fingerprinting codes. The proposed constructions use a class of codes called almost secure frameproof codes. An almost secure frameproof code is a relaxed version of a secure frameproof code, which in turn is the same as a separating code. This relaxed version is the object of our interest because it gives rise to fingerprinting codes of higher rate than fingerprinting codes derived from separating codes. The construction of almost secure frameproof codes discussed here is based on weakly biased arrays, a class of combinatorial objects tightly related to weakly dependent random variables.
dc.format.extent18 p.
dc.language.isoeng
dc.subjectÀrees temàtiques de la UPC::Informàtica::Seguretat informàtica::Criptografia
dc.subject.lcshFingerprints
dc.subject.lcshComputer security
dc.subject.otherSeparating code
dc.subject.otherSecure frameproof code
dc.subject.otherFingerprinting
dc.subject.otherTraitor tracing
dc.titleConstructions of almost secure frameproof codes with applications to fingerprinting schemes
dc.typeArticle
dc.subject.lemacDactiloscòpia
dc.subject.lemacSeguretat informàtica
dc.contributor.groupUniversitat Politècnica de Catalunya. ISG - Grup de Seguretat de la Informació
dc.identifier.doi10.1007/s10623-017-0359-z
dc.description.peerreviewedPeer Reviewed
dc.relation.publisherversionhttps://link.springer.com/article/10.1007%2Fs10623-017-0359-z
dc.rights.accessOpen Access
drac.iddocument20335558
dc.description.versionPostprint (author's final draft)
dc.relation.projectidinfo:eu-repo/grantAgreement/MICINN/6PN/TEC2011-26491
dc.relation.projectidinfo:eu-repo/grantAgreement/MINECO/1PE/TEC2015-68734-R
upcommons.citation.authorMoreira, J., Fernandez, M., Kabatiansky, G.
upcommons.citation.publishedtrue
upcommons.citation.publicationNameDesigns, Codes, and Cryptography
upcommons.citation.volume86
upcommons.citation.number4
upcommons.citation.startingPage785
upcommons.citation.endingPage802


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record

All rights reserved. This work is protected by the corresponding intellectual and industrial property rights. Without prejudice to any existing legal exemptions, reproduction, distribution, public communication or transformation of this work are prohibited without permission of the copyright holder