## REFERENCES

1Pfitzmann, B.; Schunter, M.: Asymmetric fingerprinting, in *EUROCRYPT1996*. 1996, vol. 1070 of *LNCS*, Springer, Heidelberg, 84–95.

2Lei, C.; Yu, P.; Tsai, P.; Chan, M.: An efficient and anonymous buyer-seller watermarking protocol. IEEE Trans. Image Process., 13 (12) (2004), 1618–1626.

3Tardos, G.: Optimal probabilistic fingerprint codes. J. ACM, 55 (2) (2008), 1–24.

4Nuida, K. et al. : An improvement of discrete Tardos fingerprinting codes. Design Code Cryptogr., 52 (3) (2009), 339–362.

5Laarhoven, T.; Weger, B.: Discrete distributions in the Tardos scheme, revisited, in *Proc. IH&MMSec'13*, 2013, 13–17.

6Škorić, B.; Katzenbeisser, S.; Celik, M.: Binary and q-ary Tardos codes, revisited. Design Code Cryptogr., 74 (1) (2015), 75–111.

7Cérou, F.; Furon, T.; Guyader, A.: Experimental assessment of the reliability for watermarking and fingerprinting schemes. EURASIP J. Inf. Security, 2008 (2008), 1–12.

8Charpentier, A.; Fontaine, C.; Furon, T.; Cox, I.J.: An asymmetric fingerprinting scheme based on Tardos codes, in *IH2011*. 2011, vol. 6958 of *LNCS*, Springer, Heidelberg, 43–58.

9Rivest, R.L.; Shamir, A.; Adleman, L.: A method for obtaining digital signatures and public key cryptosystems. Commun. ACM, 21 (2) (1978), 120–126.

10Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes, in *EUROCRYPT1999*. 1999, vol. 1592 of *LNCS*, Springer, Heidelberg, 223–238.

11Pfitzmann, B.; Sadeghi, A.: Coin-based anonymous fingerprinting, in *EUROCRYPT'99*. 1999, vol. 1592 of *LNCS*, Springer-Verlag, 150–164.

12Pfitzmann, B.; Sadeghi, A.: Anonymous fingerprinting with direct non-repudiation, in *ASIACRYPT'00*. 2000, vol. 1976 of *LNCS*, Springer-Verlag, 401–414.

13Camenisch, J.: Efficient anonymous fingerprinting with group signatures, in *ASIACRYPT'00*. 2000, vol. 1976 of *LNCS*, Springer-Verlag, 415–428.

14Memon, N.; Wong, P.W.: A buyer-seller watermarking protocol. IEEE Trans. Image Process., 10 (4) (2001), 643–649.

15Kuribayashi, M.; Tanaka, H.: Fingerprinting protocol for images based on additive homomorphic property. IEEE Trans. Image Process., 14 (12) (2005), 2129–2139.

16Deng, M.; Bianchi, T.; Piva, A.; Preneel, B.: An efficient buyer-seller watermarking protocol based on composite signal representation, in *MM& Sec'09*, 2009, 9–18.

17Kuribayashi, M.; Tanaka, H.: Fingerprinting protocol for on-line trade using information gap between buyer and merchant. IEICE Trans. Fund., E89-A (10) (2006), 1108–1115.

18Ferrer, J.D.; Megías, D.: Distributed multicast of fingerprinted content based on a rational peer-to-peer community. Comput. Commun., 36 (5) (2013), 542–550.

19Megías, D.; Ferrer, J.D.: Privacy-aware peer-to-peer content distribution using automatically recombined fingerprints. Multimedia Syst., 20 (2) (2014), 105–125.

20Megías, D.: Improved privacy-preserving P2P multimedia distribution based on recombined fingerprints. IEEE Trans. Depend. Sec. Comput., 12 (2) (2015), 179–189.

21Megías, D.; Qureshi, A.: Collusion-resistant and privacy-preserving P2P multimedia distribution based on recombined fingerprinting. Expert. Syst. Appl., 71 (2017), 147–172.

22Boneh, D.; Shaw, J.: Collusion-secure fingerprinting for digital data. IEEE Trans. Inform. Theory, 44 (5) (1998), 1897–1905.

23Škorić, B.; Vladimirova, T.U.; Celik, M.; Talstra, J.C.: Tardos fingerprinting is better than we thought. IEEE Trans. Inform. Theory, 54 (8) (2008), 3663–3676.

24Furon, T.; Guyader, A.; Cérou, F.: On the design and optimization of Tardos probabilistic fingerprinting codes, in *IH 2008*. 2008, vol. 5284 of *LNCS*, Springer, Heidelberg, 341–356.

25Škorić, B.; Katzenbeisser, S.; Celik, M.: Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes. Design Code Cryptogr., 46 (2) (2008), 137–166.

26Furon, T.; Preire, L.P.: EM decoding of Tardos traitor tracing codes, in *ACM Multimedia and Security*, 2009, 99–106.

27Meerwald, P.; Furon, T.: Towards joint decoding of binary Tardos fingerprinting codes. IEEE Trans. Inf. Forensics Security, 7 (4) (2012), 1168–1180.

28Desoubeaux, M.; Herzet, C.; Puech, W.; Le Guelvouit, G.: Enhanced blind decoding of Tardos codes with new MAP-based functions, in *Proc. MMSP*, 2013, 283–288.

29Oosterwijk, J.J.; Škorić, B.; Doumen, J.: A capacity-achieving simple decoder for bias-based traitor tracing schemes. IEEE Trans. Inform. Theory, 61 (7) (2015), 3882–3900.

30Laarhoven, T: Capacities and capacity-achieving decoders for various fingerprinting games, in *Proc. IH&MMSec2014*, 2014, 123–134.

31Kuribayashi, M.; Funabiki, N.: Universal scoring function based on bias equalizer for bias-based fingerprinting codes. IEICE Trans. Fund., E101-A (1) (2018), 119–128.