Show simple item record

dc.contributor.authorFernández Muñoz, Marcel
dc.contributor.authorKabatiansky, Grigory
dc.contributor.authorMoreira Sánchez, José
dc.contributor.otherUniversitat Politècnica de Catalunya. Departament d'Enginyeria Telemàtica
dc.date.accessioned2016-12-14T14:31:36Z
dc.date.issued2015
dc.identifier.citationFernandez, M., Kabatiansky, G., Moreira, J. Almost IPP-codes or provably secure digital fingerprinting codes. A: IEEE International Symposium on Information Theory. "2015 IEEE International Symposium on Information Theory (ISIT 2015): Hong Kong: 14-19 June 2015". Hong Kong: Institute of Electrical and Electronics Engineers (IEEE), 2015, p. 1595-1599.
dc.identifier.isbn978-1-4673-7705-8
dc.identifier.urihttp://hdl.handle.net/2117/98229
dc.description.abstractCodes with the Identifiable Parent Property (IPP codes) form a very useful tool in traitor tracing schemes since they guarantee (with probability 1) identification of at least one of the traitors. We consider a natural generalization of IPP codes, namely codes for which this property holds with probability close to 1. A probabilistic version of the IPP problem has been studied under the name of collusion-secure digital fingerprinting codes. We point out that, somewhat surprisingly, fingerprinting codes do no automatically have the 'almost IPP property.' © 2015 IEEE.
dc.format.extent5 p.
dc.language.isoeng
dc.publisherInstitute of Electrical and Electronics Engineers (IEEE)
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/3.0/es/
dc.subjectÀrees temàtiques de la UPC::Informàtica::Seguretat informàtica
dc.subject.lcshInformation theory
dc.subject.lcshComputer security
dc.subject.otherCompensation (personnel)
dc.subject.otherInformation theory
dc.subject.otherDigital fingerprinting
dc.subject.otherFingerprinting code
dc.subject.otherNatural generalization
dc.subject.otherProvably secure
dc.subject.otherTraitor tracing schemes
dc.titleAlmost IPP-codes or provably secure digital fingerprinting codes
dc.typeConference report
dc.subject.lemacInformació, Teoria de la
dc.subject.lemacSeguretat informàtica
dc.contributor.groupUniversitat Politècnica de Catalunya. ISG - Grup de Seguretat de la Informació
dc.identifier.doi10.1109/ISIT.2015.7282725
dc.description.peerreviewedPeer Reviewed
dc.relation.publisherversionhttp://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7282725
dc.rights.accessRestricted access - publisher's policy
local.identifier.drac18769356
dc.description.versionPostprint (published version)
dc.date.lift10000-01-01
local.citation.authorFernandez, M.; Kabatiansky, G.; Moreira, J.
local.citation.contributorIEEE International Symposium on Information Theory
local.citation.pubplaceHong Kong
local.citation.publicationName2015 IEEE International Symposium on Information Theory (ISIT 2015): Hong Kong: 14-19 June 2015
local.citation.startingPage1595
local.citation.endingPage1599


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record

Attribution-NonCommercial-NoDerivs 3.0 Spain
Except where otherwise noted, content on this work is licensed under a Creative Commons license : Attribution-NonCommercial-NoDerivs 3.0 Spain