Skip to main content
Log in

On a Class of Traceability Codes

  • Published:
Designs, Codes and Cryptography Aims and scope Submit manuscript

Abstract

Traceability codes are designed to be used in schemes that protect copyrighted digital data against piracy. The main aim of this paper is to give an answer to a Staddon–Stinson–Wei's problem of the existence of traceability codes with q< w 2 and b>q. We provide a large class of these codes constructed by using a new general construction method for q-ary codes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  1. G. T. Bogdanova, A. E. Brouwer, S. N. Kapralov and P. R. J. Östergrård, Error-correcting codes over an alphabet of four elements, Designs, Codes and Cryptography, Vol. 23 (2001) pp. 333-342.

    Google Scholar 

  2. D. Boneh and M. Franklin, An efficient public keys traitor tracing schemes, In Advanced in Cryptology-Crypto'99 (Lecture Notes in Computer Science), Springer-Verlag, Vol. 1666 (1999) pp. 338-353.

    Google Scholar 

  3. D. Boneh and J. Shaw, Collusion-secure fingerprinting for digital data, IEEE Trans. Inform. Theory, Vol. 44 (1998) pp. 1897-1905.

    Google Scholar 

  4. B. Chor, A. Fiat and M. Naor, Tracing traitors, In Advances in Cryptology-Crypto'94 (Lecture Notes in Computer Science), Springer-Verlag, Vol. 839 (1994) pp. 257-270.

    Google Scholar 

  5. B. Chor, A. Fiat, M. Naor and B. Pinkas, Tracing traitors, IEEE Trans. Inform. Theory, Vol. 46 (2000) pp. 480-491.

    Google Scholar 

  6. C. J. Colbourn and J. H. Dinitz, CRC Handbook of Combinatorial Designs, CRC Press, Inc. (1996).

  7. P. Erdös, P. Frankl and Z. Füredi, Families of finite sets in which no set is covered by the union of r other, Israel Journal of Mathematics, Vol. 51 (1985) pp. 75-89.

    Google Scholar 

  8. A. Fiat and T. Tassa, Dynamic traitor tracing, In Advances in Cryptology Crypto'99 (Lecture Notes in Computer Science), Springer-Verlag, Vol. 1666 (1999) pp. 354-371.

    Google Scholar 

  9. A. Fiat and T. Tassa, Dynamic traitor tracing, J. Cryptology, Vol. 14 (2001) pp. 211-223.

    Google Scholar 

  10. E. Gafni, J. Staddon and Y. L. Yin, Efficient methods for integrating traceability and broadcast encryption, In Advances in Cryptology-Crypto'99 (Lecture Notes in Computer Science), Springer-Verlag, Vol. 1666 (1999) pp. 372-387.

    Google Scholar 

  11. R. Kumar, S. Rajagopalan and A. Sahai, Coding constructions for blacklisting problems without computational assumptions, In Advances in Cryptology-Crypto'99 (Lecture Notes in Computer Science), Springer-Verlag, Vol. 1666 (1999) pp. 609-623.

    Google Scholar 

  12. K. Kurosawa, T. Yoshida and Y. Desmedt, Inherently large traceability and asymmetric schemes with arbiter, In Proc. IEEE Int. Symp. Inform. Theory (ISIT'2000), Sorrento, Italy, June (2000).

  13. J. N. Staddon, D. R. Stinson and R. Wei, Combinatorial properties of frameproof and traceability codes, IEEE Trans. Inform. Theory, Vol. 47 (2001) pp. 1042-1049.

    Google Scholar 

  14. D. R. Stinson and R. Wei, Combinatorial properties and constructions of traceability schemes and frameproof codes, SIAM J.Discrete Math., Vol. 11 (1998) pp. 41-53.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

van Trung, T., Martirosyan, S. On a Class of Traceability Codes. Designs, Codes and Cryptography 31, 125–132 (2004). https://doi.org/10.1023/B:DESI.0000012440.32810.23

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1023/B:DESI.0000012440.32810.23

Navigation