Traceability codes

Traceability codes are combinatorial objects introduced by Chor, Fiat and Naor in 1994 to be used in traitor tracing schemes to protect digital content. A k-traceability code is used in a scheme to trace the origin of digital content under the assumption that no more than k users collude. It is well known that an error correcting code of high minimum distance is a traceability code. When does this 'error correcting construction' produce good traceability codes? The paper explores this question. Let @? be a fixed positive integer. When q is a sufficiently large prime power, a suitable Reed-Solomon code may be used to construct a 2-traceability code containing q^@?^@?^/^4^@? codewords. The paper shows that this construction is close to best possible: there exists a constant c, depending only on @?, such that a q-ary 2-traceability code of length @? contains at most cq^@?^@?^/^4^@? codewords. This answers a question of Kabatiansky from 2005. Barg and Kabatiansky (2004) asked whether there exist families of k-traceability codes of rate bounded away from zero when q and k are constants such that q==2 and q>=k^2-@?k/2@?+1, or such that k=2 and q=3, there exist infinite families of q-ary k-traceability codes of constant rate.

[1]  Béla Bollobás,et al.  Random Graphs , 1985 .

[2]  Simon R. Blackburn,et al.  An upper bound on the size of a code with the k-identifiable parent property , 2003, J. Comb. Theory, Ser. A.

[3]  Alexander Barg,et al.  Digital fingerprinting codes: problem statements, constructions, identification of traitors , 2003, IEEE Trans. Inf. Theory.

[4]  Alexander Barg,et al.  A class of I.P.P. codes with efficient identification , 2004, J. Complex..

[5]  Tina Lindkvist,et al.  A class of traceability codes , 2002, IEEE Trans. Inf. Theory.

[6]  Tran van Trung,et al.  On a Class of Traceability Codes , 2004, Des. Codes Cryptogr..

[7]  Gregory A. Kabatiansky Good ternary 2-traceability codes exist , 2004, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..

[8]  Hongxia Jin,et al.  Combinatorial Properties for Traceability Codes Using Error Correcting Codes , 2007, IEEE Transactions on Information Theory.

[9]  Amos Fiat,et al.  Tracing traitors , 2000, IEEE Trans. Inf. Theory.

[10]  Gregory A. Kabatiansky Codes for Copyright Protection: The Case of Two Pirates , 2005, Probl. Inf. Transm..

[11]  Noga Alon,et al.  New Bounds on Parent-Identifying Codes: The Case of Multiple Parents , 2004, Combinatorics, Probability and Computing.

[12]  Jessica Staddon,et al.  Combinatorial properties of frameproof and traceability codes , 2001, IEEE Trans. Inf. Theory.

[13]  Simon R. Blackburn Surveys in Combinatorics 2003: Combinatorial schemes for protecting digital content , 2003 .

[14]  Jean-Paul M. G. Linnartz,et al.  On Codes with the Identifiable Parent Property , 1998, J. Comb. Theory, Ser. A.

[15]  J. H. van Lint,et al.  Introduction to Coding Theory , 1982 .

[16]  Miguel Soriano,et al.  A Note About the Traceability Properties of Linear Codes , 2007, ICISC.