Skip to main content
Erschienen in: Designs, Codes and Cryptography 8/2018

16.10.2017

New upper bounds for parent-identifying codes and traceability codes

Erschienen in: Designs, Codes and Cryptography | Ausgabe 8/2018

Einloggen, um Zugang zu erhalten

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In the last two decades, parent-identifying codes and traceability codes are introduced to prevent copyrighted digital data from unauthorized use. They have important applications in the scenarios like digital fingerprinting and broadcast encryption schemes. A major open problem in this research area is to determine the upper bounds for the cardinalities of these codes. In this paper we will focus on this theme. Consider a code of length N which is defined over an alphabet of size q. Let \(M_{IPPC}(N,q,t)\) and \(M_{TA}(N,q,t)\) denote the maximal cardinalities of t-parent-identifying codes and t-traceability codes, respectively, where t is known as the strength of the codes. We show \(M_{IPPC}(N,q,t)\le rq^{\lceil N/(v-1)\rceil }+(v-1-r)q^{\lfloor N/(v-1)\rfloor }\), where \(v=\lfloor (t/2+1)^2\rfloor \), \(0\le r\le v-2\) and \(N\equiv r \mod (v-1)\). This new bound improves two previously known bounds of Blackburn, and Alon and Stav. On the other hand, \(M_{TA}(N,q,t)\) is still not known for almost all t. In 2010, Blackburn, Etzion and Ng asked whether \(M_{TA}(N,q,t)\le cq^{\lceil N/t^2\rceil }\) or not, where c is a constant depending only on N, and they have shown the only known validity of this bound for \(t=2\). By using some complicated combinatorial counting arguments, we prove this bound for \(t=3\). This is the first non-trivial upper bound in the literature for traceability codes with strength three.
Literatur
2.
Zurück zum Zitat Alon N., Stav U.: New bounds on parent-identifying codes: the case of multiple parents. Comb. Probab. Comput. 13(6), 795–807 (2004).MathSciNetCrossRefMATH Alon N., Stav U.: New bounds on parent-identifying codes: the case of multiple parents. Comb. Probab. Comput. 13(6), 795–807 (2004).MathSciNetCrossRefMATH
3.
5.
Zurück zum Zitat Blackburn S.R.: An upper bound on the size of a code with the \(k\)-identifiable parent property. J. Comb. Theory A 102(1), 179–185 (2003).MathSciNetCrossRefMATH Blackburn S.R.: An upper bound on the size of a code with the \(k\)-identifiable parent property. J. Comb. Theory A 102(1), 179–185 (2003).MathSciNetCrossRefMATH
7.
8.
Zurück zum Zitat Cheng M., Miao Y.: On anti-collusion codes and detection algorithms for multimedia fingerprinting. IEEE Trans. Inf. Theory 57(7), 4843–4851 (2011).MathSciNetCrossRefMATH Cheng M., Miao Y.: On anti-collusion codes and detection algorithms for multimedia fingerprinting. IEEE Trans. Inf. Theory 57(7), 4843–4851 (2011).MathSciNetCrossRefMATH
9.
Zurück zum Zitat Chor, B., Fiat, A., Naor, M.: Tracing traitors. In: Advances in Cryptology—CRYPTO94, pp. 257–270. Springer, Berlin (1994) Chor, B., Fiat, A., Naor, M.: Tracing traitors. In: Advances in Cryptology—CRYPTO94, pp. 257–270. Springer, Berlin (1994)
10.
Zurück zum Zitat Chor B., Fiat A., Naor M., Pinkas B.: Tracing traitors. IEEE Trans. Inf. Theory 46(3), 893–910 (2000).CrossRefMATH Chor B., Fiat A., Naor M., Pinkas B.: Tracing traitors. IEEE Trans. Inf. Theory 46(3), 893–910 (2000).CrossRefMATH
11.
Zurück zum Zitat Hollmann H.D.L., van Lint J.H., Linnartz J.P., Tolhuizen L.M.G.M.: On codes with the identifiable parent property. J. Comb. Theory A 82(2), 121–133 (1998).MathSciNetCrossRefMATH Hollmann H.D.L., van Lint J.H., Linnartz J.P., Tolhuizen L.M.G.M.: On codes with the identifiable parent property. J. Comb. Theory A 82(2), 121–133 (1998).MathSciNetCrossRefMATH
12.
Zurück zum Zitat Owen S., Ng S.-L.: A note on an upper bound of traceability codes. Australas. J. Comb. 62, 140–146 (2015).MathSciNetMATH Owen S., Ng S.-L.: A note on an upper bound of traceability codes. Australas. J. Comb. 62, 140–146 (2015).MathSciNetMATH
13.
Zurück zum Zitat Shangguan C., Ge G.: Separating hash hamilies: a Johnson-type bound and new constructions. SIAM J. Discret. Math. 30(4), 2243–2264 (2016).CrossRefMATH Shangguan C., Ge G.: Separating hash hamilies: a Johnson-type bound and new constructions. SIAM J. Discret. Math. 30(4), 2243–2264 (2016).CrossRefMATH
15.
Zurück zum Zitat Silverberg A., Staddon J., Walker J.L.: Applications of list decoding to tracing traitors. IEEE Trans. Inf. Theory 49(5), 1312–1318 (2003).MathSciNetCrossRefMATH Silverberg A., Staddon J., Walker J.L.: Applications of list decoding to tracing traitors. IEEE Trans. Inf. Theory 49(5), 1312–1318 (2003).MathSciNetCrossRefMATH
16.
Zurück zum Zitat Staddon J.N., Stinson D.R., Wei R.: Combinatorial properties of frameproof and traceability codes. IEEE Trans. Inf. Theory 47(3), 1042–1049 (2001).MathSciNetCrossRefMATH Staddon J.N., Stinson D.R., Wei R.: Combinatorial properties of frameproof and traceability codes. IEEE Trans. Inf. Theory 47(3), 1042–1049 (2001).MathSciNetCrossRefMATH
17.
Zurück zum Zitat van Trung T.: A tight bound for frameproof codes viewed in terms of separating hash families. Des. Codes Cryptogr. 72(3), 713–718 (2014).MathSciNetCrossRefMATH van Trung T.: A tight bound for frameproof codes viewed in terms of separating hash families. Des. Codes Cryptogr. 72(3), 713–718 (2014).MathSciNetCrossRefMATH
Metadaten
Titel
New upper bounds for parent-identifying codes and traceability codes
Publikationsdatum
16.10.2017
Erschienen in
Designs, Codes and Cryptography / Ausgabe 8/2018
Print ISSN: 0925-1022
Elektronische ISSN: 1573-7586
DOI
https://doi.org/10.1007/s10623-017-0420-y

Weitere Artikel der Ausgabe 8/2018

Designs, Codes and Cryptography 8/2018 Zur Ausgabe