Combinatorial Properties and Constructions of Traceability Schemes and Frameproof Codes
- 1 February 1998
- journal article
- Published by Society for Industrial & Applied Mathematics (SIAM) in SIAM Journal on Discrete Mathematics
- Vol. 11 (1) , 41-53
- https://doi.org/10.1137/s0895480196304246
Abstract
In this paper, we investigate combinatorial properties and constructions of two recent topics of cryptographic interest, namely frameproof codes for digital fingerprinting and traceability schemes for broadcast encryption. We first give combinatorial descriptions of these two objects in terms of set systems and also discuss the Hamming distance of frameproof codes when viewed as error-correcting codes. From these descriptions, it is seen that existence of a c-traceability scheme implies the existence of a c-frameproof code. We then give several constructions of frameproof codes and traceability schemes by using combinatorial structures such as t-designs, packing designs, error-correcting codes, and perfect hash families. We also investigate embeddings of frameproof codes and traceability schemes, which allow a given scheme to be expanded at a later date to accommodate more users. Finally, we look briefly at bounds which establish necessary conditions for existence of these structures.Keywords
This publication has 9 references indexed in Scilit:
- Shadow bounds for self-dual codesIEEE Transactions on Information Theory, 1998
- Derandomization, Witnesses for Boolean Matrix Multiplication and Construction of Perfect Hash FunctionsAlgorithmica, 1996
- CRC Handbook of Combinatorial DesignsCombinatorics of Permutations, 1996
- Some recursive constructions for perfect hash familiesJournal of Combinatorial Designs, 1996
- Electronic marking and identification techniques to discourage document copyingIEEE Journal on Selected Areas in Communications, 1995
- Tracing TraitorsPublished by Springer Nature ,1994
- Explicit construction of exponential sized families of k-independent setsDiscrete Mathematics, 1986
- Families of finite sets in which no set is covered by the union ofr othersIsrael Journal of Mathematics, 1985
- How to share a secretCommunications of the ACM, 1979