40 likes | 146 Vues
Discover asymptotically false-positive-maximizing attacks on non-binary Tardos codes in ICT. Learn about coalition of pirates and their strategies to minimize coalition scores and lengthen innocent tails in this method. Explore curve shapes, accusation probabilities, and strategies used by pirates. Simulation results show the innocent curve going to Gaussian for large code lengths, pirates aim to reduce it. For more info, refer to poster 118.
E N D
Asymptotically false-positive-maximizing attack on non-binary Tardos codes Antonino Simone and Boris Škorić Eindhoven University of Technology ICT.open, November 2011
Collusion attacks "Coalition of pirates" Symbols received by pirates “Restricted Digit Model” Symbols allowed
Accusation probabilities m = code length c = #pirates μ̃= expected coalition score per segment Pirates want to minimize μ̃ and make the innocent tail longer threshold • Curve shapes depend on: • F, g0, g1 (fixed ‘a priori’) • Code length • # pirates • Pirate strategy guilty innocent total score (scaled) Method to compute innocent curve [Simone+Škorić 2010] Big m innocent curve goes to Gaussian
For further information… … poster 118 Thank you for your attention