研究課題/領域番号 |
21K13830
|
研究機関 | 九州大学 |
研究代表者 |
顧 玉杰 九州大学, システム情報科学研究院, 助教 (50898731)
|
研究期間 (年度) |
2021-04-01 – 2024-03-31
|
キーワード | traitor tracing / copyright protection / secure code / list decoding / code rate / collusion attack / probabilistic method / dynamic tracing |
研究実績の概要 |
Traitor tracing is a mathematical approach of protecting copyright of digital content against collusion attacks. The objective of this project is to develop new techniques for traitor tracing by virtue of combinatorial and coding-theoretic methods. In this project, we investigated secure codes with traceability for protecting the copyright of multimedia content against collusion attacks. In particular, we proposed a new concept of secure codes with list decoding (SCLD) by integrating the idea of list decoding into secure codes, which could include many existing classes of secure codes as special cases. It is shown that the newly proposed SCLD codes could have very good code rates and fast decoding/identifying algorithms. Furthermore, the application of SCLD in the dynamic traitor tracing scenario was investigated as well. Part of the results has been accepted to 2022 IEEE International Symposium on Information Theory.
|
現在までの達成度 (区分) |
現在までの達成度 (区分)
2: おおむね順調に進展している
理由
The project is conducted as planned and goes smoothly. So far, we have obtained some new technical results and part of the results has been accepted to international conference proceedings. The further investigation is being carried on as well.
|
今後の研究の推進方策 |
In the coming year, we will continue with the investigation on traitor tracing. Specifically, we will further analyze the combinatorial properties of the newly proposed SCLD codes and explore their explicit (optimal) constructions. In addition, we will further explore the connections between traitor tracing with related topics in terms of sparse approximation as well.
|
次年度使用額が生じた理由 |
In the coming year, we will continue with the project as planned. To that end, the support is desired with respect to (1) computers with high-performance computing; (2) research materials (books, and conference proceedings); (3) attendance and presentation on domestic and international conferences. The support for our research activities is highly acknowledged.
|