dc.contributor.author | Tomás Buliart, Joan |
dc.contributor.author | Fernández Muñoz, Marcel |
dc.contributor.author | Soriano Ibáñez, Miguel |
dc.contributor.other | Universitat Politècnica de Catalunya. Departament d'Enginyeria Telemàtica |
dc.date.accessioned | 2014-05-13T16:44:52Z |
dc.date.created | 2008 |
dc.date.issued | 2008 |
dc.identifier.citation | Tomas, J.; Fernandez, M.; Soriano, M. New considerations about the correct design of turbo fingerprinting codes. A: European Symposium on Research in Computer Security. "Computer security - ESORICS 2008: 13th European Symposium on Research in Computer Security: Málaga, Spain: October 6-8, 2008: proceedings". Málaga: Springer, 2008, p. 501-516. |
dc.identifier.isbn | 978-3-540-88312-8 |
dc.identifier.uri | http://hdl.handle.net/2117/22971 |
dc.description.abstract | Since the introduction of turbo codes in 1993, many new applications for this family of codes have been proposed. One of the latest, in the context of digital fingerprinting, is called turbo fingerprinting codes and was proposed by Zhang et al.. The main idea is a new fingerprinting code composed of an outer turbo code and an inner code based on the Boneh-Shaw model. The major contribution of this paper is a new analysis of this new family of codes that shows its drawbacks. These drawbacks must be considered in order to perform a correct design of a turbo fingerprinting scheme otherwise the scheme cannot retrieve the traitor users which is the main goal of digital fingerprinting scheme. Moreover, the identification of these drawbacks allows to discuss an entirely new construction of fingerprinting codes based on turbo codes. |
dc.format.extent | 16 p. |
dc.language.iso | eng |
dc.publisher | Springer |
dc.rights | Attribution-NonCommercial-NoDerivs 3.0 Spain |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/es/ |
dc.subject | Àrees temàtiques de la UPC::Informàtica::Seguretat informàtica |
dc.subject | Àrees temàtiques de la UPC::Informàtica::Seguretat informàtica::Criptografia |
dc.subject.lcsh | Computer security |
dc.subject.lcsh | Criptography |
dc.subject.other | Digital fingerprinting |
dc.subject.other | Collusion security |
dc.subject.other | Tracing traitor |
dc.subject.other | Turbo code |
dc.title | New considerations about the correct design of turbo fingerprinting codes |
dc.type | Conference report |
dc.subject.lemac | Seguretat informàtica |
dc.subject.lemac | Criptografia |
dc.contributor.group | Universitat Politècnica de Catalunya. SERTEL - Serveis Telemàtics |
dc.identifier.doi | 10.1007/978-3-540-88313-5_32 |
dc.description.peerreviewed | Peer Reviewed |
dc.relation.publisherversion | http://dl.acm.org/citation.cfm?id=1462497 |
dc.rights.access | Restricted access - publisher's policy |
local.identifier.drac | 12942889 |
dc.description.version | Postprint (published version) |
dc.date.lift | 10000-01-01 |
local.citation.author | Tomas, J.; Fernandez, M.; Soriano, M. |
local.citation.contributor | European Symposium on Research in Computer Security |
local.citation.pubplace | Málaga |
local.citation.publicationName | Computer security - ESORICS 2008: 13th European Symposium on Research in Computer Security: Málaga, Spain: October 6-8, 2008: proceedings |
local.citation.startingPage | 501 |
local.citation.endingPage | 516 |