2001
DOI: 10.1109/18.915661
|View full text |Cite
|
Sign up to set email alerts
|

Combinatorial properties of frameproof and traceability codes

Abstract: In order to protect copyrighted material, codes may be embedded in the content or codes may be associated with the keys used to recover the content. Codes can o er protection by providing some form of traceability for pirated data. Several researchers have studied di erent notions of traceability and related concepts in recent years. \Strong" versions of traceability allow at least one member of a coalition that constructs a \pirate decoder" to be traced. Weaker versions of this concept ensure that no coalitio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

2
232
0
3

Year Published

2003
2003
2010
2010

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 275 publications
(250 citation statements)
references
References 17 publications
2
232
0
3
Order By: Relevance
“…Our construction makes use of ω-traceable codes [22], in the same vein as the collusion-secure codes proposed by Boneh and Shaw [7] as a method of digital ngerprinting while preventing a collusion of a speci ed size ω from framing a user not in the coalition, but furthermore allowing the traceability of a traitor from a word generated by the coalition. We consider a code C of length on an alphabet T , with #T = t (i.e.…”
Section: Collusion-secure Codesmentioning
confidence: 99%
“…Our construction makes use of ω-traceable codes [22], in the same vein as the collusion-secure codes proposed by Boneh and Shaw [7] as a method of digital ngerprinting while preventing a collusion of a speci ed size ω from framing a user not in the coalition, but furthermore allowing the traceability of a traitor from a word generated by the coalition. We consider a code C of length on an alphabet T , with #T = t (i.e.…”
Section: Collusion-secure Codesmentioning
confidence: 99%
“…Stinson et al [37] discusses relations between these structures. We choose the language of cover-free families since they have found multiple applications in cryptography (see [20,26,36] for examples).…”
Section: Nonadaptive Group Testing With Cover-free Familiesmentioning
confidence: 99%
“…Traitor tracing systems generally fall into two categories: combinatorial, as in [9,23,30,31,13,14,10,27,2,29,28,22], and algebraic, as in [20,3,24,19,11,21,33,8]. The broadcaster's key BK in combinatorial systems can be either secret or public.…”
Section: Introductionmentioning
confidence: 99%
“…Combinatorial systems such as [9,23,30,31,13,14,10,27,2,29,28,22] are typically designed for the secret BK settings, but can be made public-key by replacing the underlying ciphers by public key systems.…”
Section: Introductionmentioning
confidence: 99%