Combinatorial properties of frameproof and traceability codes

被引:213
作者
Staddon, JN [1 ]
Stinson, DR
机构
[1] Bell Labs, Res, Palo Alto, CA 94304 USA
[2] Lakehead Univ, Dept Comp Sci, Thunder Bay, ON P7B 5E1, Canada
[3] Univ Waterloo, Dept Combinator & Optimizat, Waterloo, ON N2L 3G1, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
frameproof (FP) codes; identifiable parent property (IPP); perfect hash families; traceability (TA) codes;
D O I
10.1109/18.915661
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In order to protect copyrighted material, codes may be embedded in the content or codes may be associated with the keys used to recover the content. Codes can offer protection by providing some form of traceability (TA) for pirated data. Several researchers have studied different notions of TA and related concepts in recent years. "Strong" versions of TA allow at least one member of a coalition that constructs a "pirate decoder" to be traced. Weaker versions of this concept ensure that no coalition can "frame" a disjoint user or group of users. All these concepts can be formulated as codes having certain combinatorial properties. In this paper, we study the relationships between the various notions, and we discuss equivalent formulations using structures such as perfect hash families. We use methods from combinatorics and coding theory to provide bounds (necessary conditions) and constructions (sufficient conditions) for the objects of interest.
引用
收藏
页码:1042 / 1049
页数:8
相关论文
共 24 条
[1]  
ALON N, 1992, PROBABILISTIC METHOD
[2]  
Atici M, 1996, J COMB DES, V4, P353
[3]  
BARG A, 200020 DIMACS
[4]   Optimal linear perfect hash families [J].
Blackburn, SR ;
Wild, PR .
JOURNAL OF COMBINATORIAL THEORY SERIES A, 1998, 83 (02) :233-250
[5]  
Blackburn SR, 1999, CH CRC RES NOTES, V403, P49
[6]  
BLACKBURN SR, IN PRESS J COMM TH A
[7]   Collusion-secure fingerprinting for digital data [J].
Boneh, D ;
Shaw, J .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1998, 44 (05) :1897-1905
[8]  
Boneh D., 1999, CRYPTO, DOI DOI 10.1007/3-540-48405-1
[9]   Tracing traitors [J].
Chor, B ;
Fiat, A ;
Naor, M ;
Pinkas, B .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2000, 46 (03) :893-910
[10]  
CHOR B, 1994, ADV CRYPTOLOGY, V839, P480