• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to project page

2021 Fiscal Year Research-status Report

A Study on Combinatorial Traitor Tracing Schemes for Broadcast Encryption

Research Project

Project/Area Number 21K13830
Research InstitutionKyushu University

Principal Investigator

顧 玉杰  九州大学, システム情報科学研究院, 助教 (50898731)

Project Period (FY) 2021-04-01 – 2024-03-31
Keywordstraitor tracing / copyright protection / secure code / list decoding / code rate / collusion attack / probabilistic method / dynamic tracing
Outline of Annual Research Achievements

Traitor tracing is a mathematical approach of protecting copyright of digital content against collusion attacks. The objective of this project is to develop new techniques for traitor tracing by virtue of combinatorial and coding-theoretic methods.
In this project, we investigated secure codes with traceability for protecting the copyright of multimedia content against collusion attacks. In particular, we proposed a new concept of secure codes with list decoding (SCLD) by integrating the idea of list decoding into secure codes, which could include many existing classes of secure codes as special cases. It is shown that the newly proposed SCLD codes could have very good code rates and fast decoding/identifying algorithms. Furthermore, the application of SCLD in the dynamic traitor tracing scenario was investigated as well. Part of the results has been accepted to 2022 IEEE International Symposium on Information Theory.

Current Status of Research Progress
Current Status of Research Progress

2: Research has progressed on the whole more than it was originally planned.

Reason

The project is conducted as planned and goes smoothly. So far, we have obtained some new technical results and part of the results has been accepted to international conference proceedings. The further investigation is being carried on as well.

Strategy for Future Research Activity

In the coming year, we will continue with the investigation on traitor tracing. Specifically, we will further analyze the combinatorial properties of the newly proposed SCLD codes and explore their explicit (optimal) constructions. In addition, we will further explore the connections between traitor tracing with related topics in terms of sparse approximation as well.

Causes of Carryover

In the coming year, we will continue with the project as planned. To that end, the support is desired with respect to (1) computers with high-performance computing; (2) research materials (books, and conference proceedings); (3) attendance and presentation on domestic and international conferences.
The support for our research activities is highly acknowledged.

  • Research Products

    (13 results)

All 2022 2021 Other

All Int'l Joint Research (1 results) Journal Article (6 results) (of which Int'l Joint Research: 3 results,  Peer Reviewed: 5 results,  Open Access: 1 results) Presentation (6 results) (of which Int'l Joint Research: 2 results)

  • [Int'l Joint Research] Tel Aviv University(イスラエル)

    • Country Name
      ISRAEL
    • Counterpart Institution
      Tel Aviv University
  • [Journal Article] Secure codes with two-stage traitor tracing2022

    • Author(s)
      Yujie Gu
    • Journal Title

      暗号と情報セキュリティシンポジウム 予稿集

      Volume: - Pages: 1~3

  • [Journal Article] Signature Codes for Weighted Binary Adder Channel and Multimedia Fingerprinting2021

    • Author(s)
      Fan Jinping、Gu Yujie、Hachimori Masahiro、Miao Ying
    • Journal Title

      IEEE Transactions on Information Theory

      Volume: 67 Pages: 200~216

    • DOI

      10.1109/TIT.2020.3033445

    • Peer Reviewed
  • [Journal Article] Strongly separable matrices for nonadaptive combinatorial group testing2021

    • Author(s)
      Fan Jinping、Fu Hung-Lin、Gu Yujie、Miao Ying、Shigeno Maiko
    • Journal Title

      Discrete Applied Mathematics

      Volume: 291 Pages: 180~187

    • DOI

      10.1016/j.dam.2020.11.022

    • Peer Reviewed / Int'l Joint Research
  • [Journal Article] On Compressed Sensing Matrices Breaking the Square-Root Bottleneck2021

    • Author(s)
      Satake Shohei、Gu Yujie
    • Journal Title

      Proceedings of IEEE Information Theory Workshop

      Volume: - Pages: 416~420

    • DOI

      10.1109/ITW46852.2021.9457623

    • Peer Reviewed
  • [Journal Article] Bounds on the Capacity of PIR over Graphs2021

    • Author(s)
      Sadeh Bar、Gu Yujie、Tamo Itzhak
    • Journal Title

      Proceedings of IEEE International Symposium on Information Theory

      Volume: - Pages: 1913~1918

    • DOI

      10.1109/ISIT45174.2021.9518086

    • Peer Reviewed / Int'l Joint Research
  • [Journal Article] On the Non-Adaptive Zero-Error Capacity of the Discrete Memoryless Two-Way Channel2021

    • Author(s)
      Gu Yujie、Shayevitz Ofer
    • Journal Title

      Entropy

      Volume: 23 Pages: 1518~1518

    • DOI

      10.3390/e23111518

    • Peer Reviewed / Open Access / Int'l Joint Research
  • [Presentation] 組み合わせ AONT の安全性に関するエントロピー解析2022

    • Author(s)
      赤尾 奏名汰, 顧 玉杰, 櫻井 幸一
    • Organizer
      暗号と情報セキュリティシンポジウム
  • [Presentation] Secure codes with two-stage traitor tracing2022

    • Author(s)
      顧 玉杰
    • Organizer
      暗号と情報セキュリティシンポジウム
  • [Presentation] On compressed sensing matrices breaking the square-root bottleneck2021

    • Author(s)
      Shohei Satake and Yujie Gu
    • Organizer
      IEEE Information Theory Workshop
    • Int'l Joint Research
  • [Presentation] Bounds on the capacity of PIR over graphs2021

    • Author(s)
      Bar Sadeh, Yujie Gu, and Itzhak Tamo
    • Organizer
      IEEE International Symposium on Information Theory
    • Int'l Joint Research
  • [Presentation] グラフ理論に基づく頑健性符号の構成2021

    • Author(s)
      佐竹 翔平, 顧 玉杰, 櫻井 幸一
    • Organizer
      電子情報通信学会技術研究報告
  • [Presentation] 悉無律を満たす組み合わせ変換の情報理論的安全性に関する研究2021

    • Author(s)
      赤尾 奏名汰, 顧 玉杰, 櫻井 幸一
    • Organizer
      第44回情報理論とその応用シンポジウム

URL: 

Published: 2022-12-28  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi