研究課題/領域番号 |
21K13830
|
研究機関 | 九州大学 |
研究代表者 |
顧 玉杰 九州大学, システム情報科学研究院, 助教 (50898731)
|
研究期間 (年度) |
2021-04-01 – 2024-03-31
|
キーワード | copyright protection / traitor tracing / code rate / decoding algorithm / list decoding / fingerprinting code / dynamic traitor tracing / multimedia IPP code |
研究実績の概要 |
Traitor tracing is a mathematical approach of protecting copyright of digital content against collusion attacks. This project studies combinatorial secure codes for traitor tracing, with particular focus on exploring their maximum code rate and identifying algorithms. The obtained results are as follows. 1) A new unified concept of secure codes with list decoding (SCLDs) is proposed by integrating the idea of list decoding into secure codes with complete traceability; 2) Bounds on the maximum code rate of SCLDs are derived via the probabilistic method; 3) A two-step decoding algorithm is established for SCLDs, whose efficiency outperforms the known separable codes; 4) A two-stage dynamic framework is proposed for dynamic traitor tracing; 5) New bounds on the maximum code rate of binary multimedia IPP codes are established.
|
現在までの達成度 (区分) |
現在までの達成度 (区分)
2: おおむね順調に進展している
理由
The project is conducted as planned and goes smoothly. Regarding the secure codes for traitor tracing, new results on both their maximum code rate and decoding algorithms are established, as desired. The obtained results have been summarized for publishing in domestic and international conferences and journals.
|
今後の研究の推進方策 |
We will further explore the trade-off between the code rate and decoding efficiency of secure codes for traitor tracing in terms of their combinatorial properties. Furthermore, we will consider the traitor tracing in the more realistic noisy scenario and attempt to establish a noise-resistant traitor tracing model by combining the combinatorial secure codes and the statistical analysis techniques.
|
次年度使用額が生じた理由 |
The reasons for incurring amount to be used next fiscal year are to conduct experiments as well as to attend domestic/international conferences to collect information and present the obtained results. The usage plan includes 1) to buy a computer with high-performance computing; 2) to hire students to help do programming; 3) to support the registration and traveling fee for attending domestic and international conferences.
|