Fingerprinting Codes and Related Combinatorial Structures

Fingerprinting codes were introduced by Boneh and Shaw in 1998 as a method of copyright control. The desired properties of a good fingerprinting code has been found to have deep connections to combinatorial structures such as error-correcting codes and coverfree families. The particular property that motivated our research is called “frameproof”. This has been studied extensively when the alphabet size q is at least as large as the colluder size w. Much less is known about the case q < w, and we prove several interesting properties about the binary case q = 2 in this thesis. When the length of the code N is relatively small, we have shown that the number of codewords n cannot exceedN , which is a tight bound since the n = N case can be satisfied a trivial construction using permutation matrices. Furthermore, the only possible candidates are equivalent to this trivial construction. Generalization to a restricted parameter set of separating hash families is also given. As a consequence, the above result motivates the question of when a non-trivial construction can be found, and we give some definitive answers by considering combinatorial designs. In particular, we give a necessary and sufficient condition for a symmetric design to be a binary 3-frameproof code, and provide example classes of symmetric designs that satisfy or fail this condition. Finally, we apply our results to a problem of constructing short binary frameproof codes.

[1]  W. Marsden I and J , 2012 .

[2]  Douglas R. Stinson,et al.  Combinatorial Properties and Constructions of Traceability Schemes and Frameproof Codes , 1998, SIAM J. Discret. Math..

[3]  Douglas R. Stinson,et al.  Secure frameproof codes, key distribution patterns, group testing algorithms and related structures , 2000 .

[4]  Hiroshi Kimura,et al.  Classification of Hadamard matrices of order 28 , 1994, Discret. Math..

[5]  Dean Crnkovic,et al.  Some new symmetric designs with parameters (64, 28, 12) , 2001, Discret. Math..

[6]  Douglas R. Stinson,et al.  On tight bounds for binary frameproof codes , 2015, Des. Codes Cryptogr..

[7]  Dan Collusion-Secure Fingerprinting for Digital Data , 2002 .

[8]  C. Colbourn,et al.  Handbook of Combinatorial Designs , 2006 .

[9]  Tran van Trung Maximal arcs and related designs , 1991, J. Comb. Theory, Ser. A.

[10]  D. A. Burgess On Character Sums and Primitive Roots , 1962 .

[11]  Tran van Trung,et al.  Improved bounds for separating hash families , 2013, Des. Codes Cryptogr..

[12]  Min Wu,et al.  Anti-collusion fingerprinting for multimedia , 2003, IEEE Trans. Signal Process..

[13]  Douglas R. Stinson,et al.  Frameproof and IPP Codes , 2001, INDOCRYPT.

[14]  Kurt Mehlhorn,et al.  On the program size of perfect and universal hash functions , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).

[15]  Tran van Trung A tight bound for frameproof codes viewed in terms of separating hash families , 2014, Des. Codes Cryptogr..

[16]  Charles J. Colbourn,et al.  Binary Covering Arrays and Existentially Closed Graphs , 2009, IWCC.

[17]  Tran van Trung,et al.  Bounds for separating hash families , 2011, J. Comb. Theory, Ser. A.

[18]  Gennian Ge,et al.  New Bounds for Frameproof Codes , 2017, IEEE Transactions on Information Theory.

[19]  Jacobus H. van Lint,et al.  Ovals in Projective Designs , 1979, J. Comb. Theory, Ser. A.

[20]  Douglas R. Stinson,et al.  A bound on the size of separating hash families , 2008, J. Comb. Theory, Ser. A.

[21]  Abhi Shelat,et al.  Lower bounds for collusion-secure fingerprinting , 2003, SODA '03.

[22]  Douglas R. Stinson,et al.  On generalized separating hash families , 2008, J. Comb. Theory, Ser. A.

[23]  Minquan Cheng,et al.  On Anti-Collusion Codes and Detection Algorithms for Multimedia Fingerprinting , 2011, IEEE Transactions on Information Theory.

[24]  R.H.F. Denniston Enumeration of Symmetric Designs (25,9,3) , 1982 .

[25]  Jessica Staddon,et al.  Combinatorial properties of frameproof and traceability codes , 2001, IEEE Trans. Inf. Theory.

[26]  R. Graham,et al.  A Constructive Solution to a Tournament Problem , 1971, Canadian Mathematical Bulletin.

[27]  Douglas R. Stinson,et al.  Combinatorial designs: constructions and analysis , 2003, SIGA.

[28]  Behruz Tayfeh-Rezaie,et al.  On the classification of Hadamard matrices of order 32 , 2010 .

[29]  Douglas R Stinson,et al.  New constructions for perfect hash families and related structures using combinatorial designs and codes , 2000 .

[30]  Simon R. Blackburn Frameproof Codes , 2003, SIAM J. Discret. Math..