2021 Fiscal Year Research-status Report
A Study on Combinatorial Traitor Tracing Schemes for Broadcast Encryption
Project/Area Number |
21K13830
|
Research Institution | Kyushu University |
Principal Investigator |
顧 玉杰 九州大学, システム情報科学研究院, 助教 (50898731)
|
Project Period (FY) |
2021-04-01 – 2024-03-31
|
Keywords | traitor tracing / copyright protection / secure code / list decoding / code rate / collusion attack / probabilistic method / dynamic tracing |
Outline of Annual Research Achievements |
Traitor tracing is a mathematical approach of protecting copyright of digital content against collusion attacks. The objective of this project is to develop new techniques for traitor tracing by virtue of combinatorial and coding-theoretic methods. In this project, we investigated secure codes with traceability for protecting the copyright of multimedia content against collusion attacks. In particular, we proposed a new concept of secure codes with list decoding (SCLD) by integrating the idea of list decoding into secure codes, which could include many existing classes of secure codes as special cases. It is shown that the newly proposed SCLD codes could have very good code rates and fast decoding/identifying algorithms. Furthermore, the application of SCLD in the dynamic traitor tracing scenario was investigated as well. Part of the results has been accepted to 2022 IEEE International Symposium on Information Theory.
|
Current Status of Research Progress |
Current Status of Research Progress
2: Research has progressed on the whole more than it was originally planned.
Reason
The project is conducted as planned and goes smoothly. So far, we have obtained some new technical results and part of the results has been accepted to international conference proceedings. The further investigation is being carried on as well.
|
Strategy for Future Research Activity |
In the coming year, we will continue with the investigation on traitor tracing. Specifically, we will further analyze the combinatorial properties of the newly proposed SCLD codes and explore their explicit (optimal) constructions. In addition, we will further explore the connections between traitor tracing with related topics in terms of sparse approximation as well.
|
Causes of Carryover |
In the coming year, we will continue with the project as planned. To that end, the support is desired with respect to (1) computers with high-performance computing; (2) research materials (books, and conference proceedings); (3) attendance and presentation on domestic and international conferences. The support for our research activities is highly acknowledged.
|