On symmetric designs and binary 3-frameproof codes

نویسندگان

  • Chuan Guo
  • Douglas R. Stinson
  • Tran van Trung
چکیده

In this paper, we study when the incidence matrix of a symmetric (v, k, λ)-BIBD is a 3-frameproof code. We show the existence of infinite families of symmetric BIBDs that are 3-frameproof codes, as well as infinite families of symmetric BIBDs that are not 3-frameproof codes.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Fingerprinting Codes and Related Combinatorial Structures

Fingerprinting codes were introduced by Boneh and Shaw in 1998 as a method of copyright control. The desired properties of a good fingerprinting code has been found to have deep connections to combinatorial structures such as error-correcting codes and coverfree families. The particular property that motivated our research is called “frameproof”. This has been studied extensively when the alpha...

متن کامل

On tight bounds for binary frameproof codes

In this paper, we study w-frameproof codes, which are equivalent to {1, w}-separating hash families. Our main results concern binary codes, which are defined over an alphabet of two symbols. For all w ≥ 3, and for w + 1 ≤ N ≤ 3w, we show that an SHF(N ;n, 2, {1, w}) exists only if n ≤ N , and an SHF(N ;N, 2, {1, w}) must be a permutation matrix of degree N .

متن کامل

Combinatorial Properties and Constructions of Traceability Schemes and Frameproof Codes

In this paper we investigate combinatorial properties and constructions of two recent topics of cryptographic interest namely frameproof codes for digital ngerprinting and traceability schemes for broadcast encryption We rst give combinatorial descriptions of these two objects in terms of set systems and also discuss the Hamming distance of frameproof codes when viewed as error correcting codes...

متن کامل

Strongly separable codes

Binary t-frameproof codes (t-FPCs) are used in multimedia fingerprinting schemes where the identification of authorized users taking part in the averaging collusion attack is required. In this paper, a binary strongly t-separable code (t-SSC) is introduced to improve such a scheme based on a binary t-FPC. A binary t-SSC has the same traceability as a binary t-FPC but has more codewords than a b...

متن کامل

Dynamic frameproof codes

There are many schemes in the literature for protecting digital data from piracy by the use of digital fingerprinting, such as frameproof codes, which prevent traitorous users from colluding to frame an innocent user, and traitortracing schemes, which enable the identification of users involved in piracy. The concept of traitor tracing has been applied to a digital broadcast setting in the form...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014