[PDF][PDF] Search problems in cryptography: from fingerprinting to lattice sieving

T Laarhoven - 2016 - research.tue.nl
Search problems in cryptography Page 1 Search problems in cryptography: from fingerprinting
to lattice sieving Citation for published version (APA): Laarhoven, T. (2016). Search problems …

An improvement of discrete Tardos fingerprinting codes

K Nuida, S Fujitsu, M Hagiwara, T Kitagawa… - Designs, Codes and …, 2009 - Springer
It has been proven that the code lengths of Tardos's collusion-secure fingerprinting codes
are of theoretically minimal order with respect to the number of adversarial users (pirates) …

High rate fingerprinting codes and the fingerprinting capacity

E Amiri, G Tardos - Proceedings of the Twentieth Annual ACM-SIAM …, 2009 - SIAM
Including a unique code in each copy of a distributed document is an effective way of
fighting intellectual piracy. Codes designed for this purpose that are secure against collusion …

Digital watermarking

M Barni, S Katzenbeisser - Handbook of Financial Cryptography …, 2010 - taylorfrancis.com
Though the science of hiding a message within a host carrier dates back to ancient Greeks
or even before, data hiding technology has been revitalized starting from mid-1990s [8, 23] …

On the design and optimization of Tardos probabilistic fingerprinting codes

T Furon, A Guyader, F Cérou - International Workshop on Information …, 2008 - Springer
G. Tardos 1 was the first to give a construction of a fingerprinting code whose length meets
the lowest known bound in O(c^2\logn1). This was a real breakthrough because the …

An asymmetric fingerprinting scheme based on Tardos codes

A Charpentier, C Fontaine, T Furon, I Cox - International workshop on …, 2011 - Springer
Asymmetric fingerprinting protocols are designed to prevent an untrustworthy Provider
incriminating an innocent Buyer. These protocols enable the Buyer to generate their own …

Toward practical joint decoding of binary Tardos fingerprinting codes

P Meerwald, T Furon - IEEE Transactions on Information …, 2012 - ieeexplore.ieee.org
The class of joint decoder in fingerprinting codes is of utmost importance in theoretical
papers to establish the concept of fingerprint capacity. However, no implementation …

Privacy-Preserving Fingerprinting Against Collusion and Correlation Threats in Genomic Data

T Ji, E Ayday, E Yilmaz, P Li - Proceedings on Privacy Enhancing …, 2024 - petsymposium.org
Sharing genomic databases is critical to the collaborative research in computational biology.
A shared database is more informative than specific genome-wide association studies …

Worst case attacks against binary probabilistic traitor tracing codes

T Furon, L Pérez-Freire - 2009 First IEEE International …, 2009 - ieeexplore.ieee.org
This article deals with traitor tracing which is also known as active fingerprinting, content
serialization, or user forensics. We study the impact of worst case attacks on the well-known …

Dynamic Tardos traitor tracing schemes

T Laarhoven, J Doumen, P Roelse… - IEEE Transactions …, 2013 - ieeexplore.ieee.org
We construct binary dynamic traitor tracing schemes, where the number of watermark bits
needed to trace and disconnect any coalition of pirates is quadratic in the number of pirates …