Abstract
If Ä i s aq-ary code of length n and a, b, ..., e are codewords, then c is called a descendant of a, b, ..., e if c i ε a i , b i , ..., e i for i = 1, ..., n. Codes Ä with the property that coalitions of a limited size have restrictions on their descendants are studied. Namely, we consider codes with the following partial identification property, referred to later as 2- secure frameproof codes (2-SFPC): any two non intersecting coalitions of size at most 2 have no common descendant.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Th. Beth, D. Jungnickel and H. Lenz, Design Theory, Wissenschaftsverlag, Berlin, (1985).
D. Boneh and J. Shaw, “Collusion-secure fingerprinting for digital data”, Springer-Verlag LNCS963 (1995), pp. 452–465 (Advances in Cryptology-Crypto’ 95).
B. Chor, A. Fiat and M. Naor, “Tracing traitors”, Springer-Verlag LNCS839 (1994), pp. 257–270(Advances in Cryptology-Crypto’ 94).
A. D. Friedman, R. L. Graham and J. D. Ullman, “Universal single transition time asynchronous state assignments”, IEEE Trans. Comput. vol.18 (1969) pp.541–547.
J. Körner and G. Simonyi, “Separating partition systems and locally different sequences”, SIAM J. Discrete Math., vol. 1, pp. 355–359, 1988.
F. J. MacWilliams and N. J. A. Sloane, The Theory of Error-Correcting Codes, North-Holland, Amsterdam, (1977).
T. Nanya and Y. Tohma, “On Universal Single Transition Time Asynchronous State Assignments”, IEEE Trans. Comput. vol. 27 (1978) pp. 781–782.
Q.A. Nguyen, L. Györ. and J. Massey, “Constructions of Binary Constant-Weight Cyclic Codes and Cyclically Permutable Codes”, IEEE Trans. on Inf. Theory, vol. 38, no. 3, (1992), pp. 940–949.
V.S. Pless, W.C. Huffman-Editors, Handbook of Coding Theory, Elsevier, Amsterdam (1998).
Yu.L. Sagalovitch, “Separating systems”, Problems of Information Transmission, Vol. 30 (2) (1994), pp. 105–123.
D.R. Stinson, Tran Van Trung and R. Wei, “Secure Frameproof Codes, Key Distribution Patterns, Group Testing Algorithms and Related Structures”, J. Stat. Planning and Inference, vol. 86 (2)(2000), pp. 595–617.
D.R. Stinson, R. Wei and L. Zhu, “New Constructions for Perfect Hash Families and Related Structures Using Combinatorial Designs and Codes”, J. of Combinatorial Designs, vol. 8 (2000), pp. 189–200.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Encheva, S., Cohen, G. (2001). Partially Identifying Codes for Copyright Protection. In: Boztaş, S., Shparlinski, I.E. (eds) Applied Algebra, Algebraic Algorithms and Error-Correcting Codes. AAECC 2001. Lecture Notes in Computer Science, vol 2227. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45624-4_27
Download citation
DOI: https://doi.org/10.1007/3-540-45624-4_27
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-42911-1
Online ISBN: 978-3-540-45624-7
eBook Packages: Springer Book Archive