Skip to main content
Log in

New Constructions for IPP Codes

  • Published:
Designs, Codes and Cryptography Aims and scope Submit manuscript

Abstract

Identifiable parent property (IPP) codes are introduced to provide protection against illegal producing of copyrighted digital material. In this paper we consider explicit construction methods for IPP codes by means of recursion techniques. The first method directly constructs IPP codes, whereas the second constructs perfect hash families that are then used to derive IPP codes. In fact, the first construction provides an infinite class of IPP codes having the best known asymptotic behavior. We also prove that this class has a traitor tracing algorithm with a runtime of O(M) in general, where M is the number of codewords.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  • N. A lon (1986) ArticleTitleExplicit construction of exponential sized families of k-independent sets iscrete Math 58 191–193

    Google Scholar 

  • A. Barg G. Cohen S. Encheva G. Kabatiansky G. Z \’emor A hypergraph (2001) ArticleTitleapproach to the identifying parent property: the case of multiple parents SIAM J. Discrete. Math. 14 423–431 Occurrence Handle1011.94014 Occurrence Handle1857594

    MATH  MathSciNet  Google Scholar 

  • D. Boneh and M. Franklin, An efficient public key traitor tracing schemes, In Advances in Cryptology - Crypto’94, Lecture Notes in Computer Science, Springer-Verlag (1994) pp. 257–270.

  • D. Boneh J. S haw (1998) ArticleTitleCollusion-secure fingerprinting for digital data IEEE Trans. Inform. Theory 44 1897–1905 Occurrence Handle0931.94051 Occurrence Handle1664047

    MATH  MathSciNet  Google Scholar 

  • K. A. Bush (1952) ArticleTitleA generalization of a theorem due to MacNeish Ann. Math. Stat. 23 293–295 Occurrence Handle0047.01702 Occurrence Handle49145

    MATH  MathSciNet  Google Scholar 

  • C. J. Colbourn and J. H. Dinitz, CRC Handbook of Combinatorial Designs, CRC Press, Inc. (1996).

  • ZJ Czech G Havas BS Majewski (1997) ArticleTitlePerfect hashing Theor. Comp. Sci. 182 1–143 Occurrence Handle0954.68060 Occurrence Handle1463931

    MATH  MathSciNet  Google Scholar 

  • B. Chor, A. Fiat and M. Naor, Tracing traitors, In Advances in Cryptology - Crypto’94, Lecture Notes in Computer Science, Springer-Verlag (1994) pp. 257–270.

  • B. Chor A. Fiat M. Naor B. Pinkas (2000) ArticleTitleTracing traitors IEEE Trans. Inform. Theory 46 480–491

    Google Scholar 

  • A. Fiat and T. Tassa, Dynamic traitor tracing, In Advances in Cryptology Crypto’99, Lecture Notes in Computer Science, Springer-Verlag (1999) pp. 354–371.

  • A. Fiat T. Tassa (2001) ArticleTitleDynamic traitor tracing J. Cryptology 14 211–223 Occurrence Handle1023.94541 Occurrence Handle1837789

    MATH  MathSciNet  Google Scholar 

  • kE. Gafni, J. Staddon, and Y. L. Yin, Efficient methods for integrating traceability and broadcast encryption, In Advances in Cryptology–Crypto’99, Lecture Notes in Computer Science, Springer-Verlag (1999) pp. 372–387.

  • V. Guruswami M. Sudan (1999) ArticleTitleImproved decoding of Reed-Solomon and algebraic-geometry codes IEEE Trans. Inform. Theory 45 1757–1767 Occurrence Handle0958.94036 Occurrence Handle1720630

    MATH  MathSciNet  Google Scholar 

  • V. Guruswami and M. Sudan, List decoding algorithms for certain concatenated codes, In Proc. 32nd ACM Symposium on Theory of Computing (STOC 2000), 181–190.

  • V. Guruswami, List Decoding of Error-Correcting Codes, PhD Thesis, MIT (2001).

  • H. D. L. Hollmann J. H. Lint Particlevan JP Linnartz LMGM Tolhuizen (1998) ArticleTitleOn codes with identifiable parent property J. Comb. Theory A 82 121–133 Occurrence Handle0910.05070

    MATH  Google Scholar 

  • S. S. Martirosyan and S. S. Martirosyan, New upper bound on the cardinality of a K-separated set or perfect hash family and a near optimal construction for it, Trans. IPIA of NAN RA & YSU ‘‘Mathematical Problems of Computer Science’’, Vol. XXI (2000) pp. 104–115.

  • R. Safavi-Naini Yejing Wang (2001) ArticleTitleNew results on frameproof codes and traceability schemes IEEE Trans. Inform. Theory 47 3029–3033 Occurrence Handle1018.94019 Occurrence Handle1872863

    MATH  MathSciNet  Google Scholar 

  • P.Sarkar, D. R. Stinson, Frameproof and IPP Codes, Preprint.

  • A. Silverberg J. N. Staddon J. L. Walker (2001) ArticleTitleEfficient traitor tracing algorithms using list decoding In ASIACRYPT 2001 Lect. Notes Comput. Sci. 2248 175–192 Occurrence Handle10.1007/3-540-45682-1_11 Occurrence Handle1934842

    Article  MathSciNet  Google Scholar 

  • J. N. Staddon D. R. Stinson R. Wei (2001) ArticleTitleCombinatorial properties of frameproof and traceability codes IEEE Trans. Inform. Theory 47 1042–1049 Occurrence Handle1001.94032 Occurrence Handle1829330

    MATH  MathSciNet  Google Scholar 

  • D. R. Stinson Tran Trung Particlevan R Wei (2000) ArticleTitleSecure frameproof codes, key distribution patterns, group testing algorithms and related structures J. Statist. Planning Inference 86 595–617 Occurrence Handle1054.94013

    MATH  Google Scholar 

  • D. R. Stinson R. Wei (1998) ArticleTitleCombinatorial properties and constructions of traceability schemes and frameproof codes SIAM J. Discrete Math. 11 41–53 Occurrence Handle0972.94028 Occurrence Handle1612849

    MATH  MathSciNet  Google Scholar 

  • D. R. Stinson R. Wei L. Zhu (2000) ArticleTitleNew constructions for perfect hash families and related structures using combinatorial designs and codes J. Combin. Designs 8 189–200 Occurrence Handle0956.68159 Occurrence Handle1752734

    MATH  MathSciNet  Google Scholar 

  • M Sudan (1997) ArticleTitleDecoding of Reed-Solomon codes beyond the error-correction bound. J. Complexity 13 180–193 Occurrence Handle0872.68026 Occurrence Handle1449766

    MATH  MathSciNet  Google Scholar 

  • M. Sudan, Decoding of Reed-Solomon codes beyond the error-correction diameter, In Proc. 35th Annual Allerton Conference on Communication, Control and Computing (1997) pp. 215–224.

  • ran van Trung and Sosina Martirosyan, On a class of traceability codes, to appear in Designs, Codes and Cryptography.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tran Van Trung.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Trung, T.V., Martirosyan, S. New Constructions for IPP Codes. Des Codes Crypt 35, 227–239 (2005). https://doi.org/10.1007/s10623-005-6402-5

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10623-005-6402-5

Keywords

Navigation