2023 Fiscal Year Research-status Report
A Study on Combinatorial Traitor Tracing Schemes for Broadcast Encryption
Project/Area Number |
21K13830
|
Research Institution | Kyushu University |
Principal Investigator |
顧 玉杰 九州大学, システム情報科学研究院, 助教 (50898731)
|
Project Period (FY) |
2021-04-01 – 2025-03-31
|
Keywords | secure code / list decoding / probabilistic method / dynamic traitor tracing / fingerprinting / copyright protection |
Outline of Annual Research Achievements |
Traitor tracing is a mathematical approach for protecting the copyright of digital content against collusion attacks. This project studies combinatorial secure codes for traitor tracing, with a particular focus on exploring their largest code rate and efficient identification algorithms. The obtained results are as follows: 1) A new unified concept of secure codes with list decoding (SCLDs) is proposed by integrating the idea of list decoding into secure codes with complete traceability; 2) Bounds on the largest code rate of SCLDs are derived via the probabilistic method; 3) A two-step decoding algorithm is established for SCLDs, which outperforms known fingerprinting codes in efficiency; 4) A two-stage dynamic framework is proposed for dynamic traitor tracing; 5) New bounds on the largest code rate of binary multimedia IPP codes are established; 6) Several combinatorial and algebraic constructions are developed for SCLDs.
|
Current Status of Research Progress |
Current Status of Research Progress
2: Research has progressed on the whole more than it was originally planned.
Reason
The project is being conducted as planned and is progressing smoothly. New results on the largest code rate, explicit constructions, and decoding algorithms for secure codes with list decoding have been established as desired. These results have been summarized for publication in domestic and international conferences and journals.
|
Strategy for Future Research Activity |
Based on the obtained results, we will further explore the trade-off between the code rate and decoding efficiency of secure codes for traitor tracing using combinatorial and information-theoretical techniques.
|
Causes of Carryover |
We will further conduct experimental evaluations and attend domestic and international conferences to present the results obtained from this project.
|