• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to project page

2022 Fiscal Year Research-status Report

A Study on Combinatorial Traitor Tracing Schemes for Broadcast Encryption

Research Project

Project/Area Number 21K13830
Research InstitutionKyushu University

Principal Investigator

顧 玉杰  九州大学, システム情報科学研究院, 助教 (50898731)

Project Period (FY) 2021-04-01 – 2024-03-31
Keywordscopyright protection / traitor tracing / code rate / decoding algorithm / list decoding / fingerprinting code / dynamic traitor tracing / multimedia IPP code
Outline of Annual Research Achievements

Traitor tracing is a mathematical approach of protecting copyright of digital content against collusion attacks. This project studies combinatorial secure codes for traitor tracing, with particular focus on exploring their maximum code rate and identifying algorithms. The obtained results are as follows. 1) A new unified concept of secure codes with list decoding (SCLDs) is proposed by integrating the idea of list decoding into secure codes with complete traceability; 2) Bounds on the maximum code rate of SCLDs are derived via the probabilistic method; 3) A two-step decoding algorithm is established for SCLDs, whose efficiency outperforms the known separable codes; 4) A two-stage dynamic framework is proposed for dynamic traitor tracing; 5) New bounds on the maximum code rate of binary multimedia IPP codes are established.

Current Status of Research Progress
Current Status of Research Progress

2: Research has progressed on the whole more than it was originally planned.

Reason

The project is conducted as planned and goes smoothly. Regarding the secure codes for traitor tracing, new results on both their maximum code rate and decoding algorithms are established, as desired. The obtained results have been summarized for publishing in domestic and international conferences and journals.

Strategy for Future Research Activity

We will further explore the trade-off between the code rate and decoding efficiency of secure codes for traitor tracing in terms of their combinatorial properties. Furthermore, we will consider the traitor tracing in the more realistic noisy scenario and attempt to establish a noise-resistant traitor tracing model by combining the combinatorial secure codes and the statistical analysis techniques.

Causes of Carryover

The reasons for incurring amount to be used next fiscal year are to conduct experiments as well as to attend domestic/international conferences to collect information and present the obtained results. The usage plan includes 1) to buy a computer with high-performance computing; 2) to hire students to help do programming; 3) to support the registration and traveling fee for attending domestic and international conferences.

  • Research Products

    (16 results)

All 2023 2022 Other

All Int'l Joint Research (3 results) Journal Article (6 results) (of which Int'l Joint Research: 5 results,  Peer Reviewed: 6 results) Presentation (7 results) (of which Int'l Joint Research: 3 results,  Invited: 4 results)

  • [Int'l Joint Research] University of Waterloo(カナダ)

    • Country Name
      CANADA
    • Counterpart Institution
      University of Waterloo
  • [Int'l Joint Research] Skoltech(ロシア連邦)

    • Country Name
      RUSSIA FEDERATION
    • Counterpart Institution
      Skoltech
  • [Int'l Joint Research] Shanghai Normal University(中国)

    • Country Name
      CHINA
    • Counterpart Institution
      Shanghai Normal University
  • [Journal Article] Bounds on the Capacity of Private Information Retrieval Over Graphs2023

    • Author(s)
      Sadeh Bar、Gu Yujie、Tamo Itzhak
    • Journal Title

      IEEE Transactions on Information Forensics and Security

      Volume: 18 Pages: 261~273

    • DOI

      10.1109/TIFS.2022.3220034

    • Peer Reviewed / Int'l Joint Research
  • [Journal Article] Explicit Non-malleable Codes from Bipartite Graphs2023

    • Author(s)
      Satake Shohei、Gu Yujie、Sakurai Kouichi
    • Journal Title

      WAIFI 2022: Arithmetic of Finite Fields

      Volume: 13638 Pages: 221~236

    • DOI

      10.1007/978-3-031-22944-2_14

    • Peer Reviewed
  • [Journal Article] Secure codes with list decoding2022

    • Author(s)
      Gu Yujie、Vorobyev Ilya、Miao Ying
    • Journal Title

      2022 IEEE International Symposium on Information Theory (ISIT)

      Volume: - Pages: 2350-2355

    • DOI

      10.1109/ISIT50566.2022.9834783

    • Peer Reviewed / Int'l Joint Research
  • [Journal Article] On the Information-Theoretic Security of Combinatorial All-or-Nothing Transforms2022

    • Author(s)
      Gu Yujie、Akao Sonata、Esfahani Navid Nasr、Miao Ying、Sakurai Kouichi
    • Journal Title

      IEEE Transactions on Information Theory

      Volume: 68 Pages: 6904~6914

    • DOI

      10.1109/TIT.2022.3174008

    • Peer Reviewed / Int'l Joint Research
  • [Journal Article] Combinatorial secure codes for copyright protection and related problems2022

    • Author(s)
      Jinping Fan、Yujie Gu、Ying Miao
    • Journal Title

      SCIENTIA SINICA Mathematica

      Volume: 53 Pages: 123~123

    • DOI

      10.1360/SSM-2022-0079

    • Peer Reviewed / Int'l Joint Research
  • [Journal Article] On the Security Properties of Combinatorial All-or-nothing Transforms2022

    • Author(s)
      Gu Yujie、Akao Sonata、Esfahani Navid Nasr、Miao Ying、Sakurai Kouichi
    • Journal Title

      2022 IEEE International Symposium on Information Theory (ISIT)

      Volume: - Pages: 1447-1452

    • DOI

      10.1109/ISIT50566.2022.9834366

    • Peer Reviewed / Int'l Joint Research
  • [Presentation] Secure codes with list decoding2022

    • Author(s)
      Yujie Gu
    • Organizer
      電子情報通信学会 研究会 IT EMM
    • Invited
  • [Presentation] On the security properties of combinatorial all-or-nothing transforms2022

    • Author(s)
      Yujie Gu, Sonata Akao, Navid Nasr Esfahani, Ying Miao, Kouichi Sakurai
    • Organizer
      2022 IEEE International Symposium on Information Theory (ISIT)
    • Int'l Joint Research
  • [Presentation] Secure codes with list decoding2022

    • Author(s)
      Yujie Gu, Ilya Vorobyev, and Ying Miao
    • Organizer
      2022 IEEE International Symposium on Information Theory (ISIT)
    • Int'l Joint Research
  • [Presentation] Private Information Retrieval Meets Graph Based Replication Systems2022

    • Author(s)
      Yujie Gu
    • Organizer
      名古屋組合せ論セミナー
    • Invited
  • [Presentation] Private information retrieval over graphs2022

    • Author(s)
      Yujie Gu
    • Organizer
      第21回情報科学技術フォーラム (FIT2022)
    • Invited
  • [Presentation] Privacy Protection in Information Retrieval via Graph Edge Colorings2022

    • Author(s)
      Yujie Gu
    • Organizer
      Data Science Institute, Shandong University
    • Invited
  • [Presentation] A mathematical study of copyright protection2022

    • Author(s)
      Yujie Gu
    • Organizer
      Asian Deans' Forum 2022 - The Rising Stars Women in Engineering Workshop
    • Int'l Joint Research

URL: 

Published: 2023-12-25  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi