New results for traitor tracing schemes

In the last two decades, several classes of codes are introduced to protect the copyrighted digital data. They have important applications in the scenarios like digital fingerprinting and broadcast encryption schemes. In this paper we will discuss three important classes of such codes, namely, frameproof codes, parent-identifying codes and traceability codes. Firstly, suppose $N(t)$ is the minimal integer such that there exists a binary $t$-frameproof code of length $N$ with cardinality larger than $N$, we prove that $N(t)\ge\frac{15+\sqrt{33}}{24} (t-2)^2$, which is a great improvement of the previously known bound $N(t)\ge\binom{t+1}{2}$. Moreover, we find that the determination of $N(t)$ is closely related to a conjecture of Erd\H{o}s, Frankl and F\"uredi posed in the 1980's, which implies the conjectured value $N(t)=t^2+o(t^2)$. Secondly, we derive a new upper bound for parent-identifying codes, which is superior than all previously known bounds. Thirdly, we present an upper bound for 3-traceability codes, which shows that a $q$-ary 3-traceability code of length $N$ can have at most $cq^{\lceil N/9\rceil}$ codewords, where $c$ is a constant only related to the code length $N$. It is the first meaningful upper bound for 3-traceability codes and our result supports a conjecture of Blackburn et al. posed in 2010.

[1]  Miklós Ruszinkó,et al.  On the upper bound of the size of the r -cover-free families , 1994 .

[2]  Simon R. Blackburn,et al.  An upper bound on the size of a code with the k-identifiable parent property , 2003, J. Comb. Theory, Ser. A.

[3]  Gennian Ge,et al.  New Bounds on the Number of Tests for Disjunct Matrices , 2015, IEEE Transactions on Information Theory.

[4]  Tran van Trung A tight bound for frameproof codes viewed in terms of separating hash families , 2014, Des. Codes Cryptogr..

[5]  Alexander Barg,et al.  A class of I.P.P. codes with efficient identification , 2004, J. Complex..

[6]  Gennian Ge,et al.  New Bounds for Frameproof Codes , 2017, IEEE Transactions on Information Theory.

[7]  Siaw-Lynn Ng,et al.  A note on an upper bound of traceability codes , 2015, Australas. J Comb..

[8]  Dan Boneh,et al.  Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.

[9]  Noga Alon,et al.  Parent-Identifying Codes , 2001, J. Comb. Theory, Ser. A.

[10]  Simon R. Blackburn Frameproof Codes , 2003, SIAM J. Discret. Math..

[11]  Noga Alon,et al.  New Bounds on Parent-Identifying Codes: The Case of Multiple Parents , 2004, Combinatorics, Probability and Computing.

[12]  Douglas R. Stinson,et al.  On tight bounds for binary frameproof codes , 2015, Des. Codes Cryptogr..

[13]  Amos Fiat,et al.  Tracing traitors , 2000, IEEE Trans. Inf. Theory.

[14]  Dan Collusion-Secure Fingerprinting for Digital Data , 2002 .

[15]  M. Ram Murty,et al.  ON A CONJECTURE OF ERD ˝ OS , 2012 .

[16]  Tuvi Etzion,et al.  Traceability codes , 2009, J. Comb. Theory, Ser. A.

[17]  Jessica Staddon,et al.  Applications of list decoding to tracing traitors , 2003, IEEE Trans. Inf. Theory.

[18]  Minquan Cheng,et al.  On Anti-Collusion Codes and Detection Algorithms for Multimedia Fingerprinting , 2011, IEEE Transactions on Information Theory.

[19]  Arkadii G. D'yachkov,et al.  Cover-free codes and separating system codes , 2017, Des. Codes Cryptogr..

[20]  Jessica Staddon,et al.  Combinatorial properties of frameproof and traceability codes , 2001, IEEE Trans. Inf. Theory.

[21]  Gérard D. Cohen,et al.  A Hypergraph Approach to the Identifying Parent Property: The Case of Multiple Parents , 2001, SIAM J. Discret. Math..

[22]  P. Erdös,et al.  Families of finite sets in which no set is covered by the union ofr others , 1985 .

[23]  Douglas R Stinson,et al.  On Symmetric Designs and Binary 3-Frameproof Codes , 2015 .