1,323 research outputs found

    Fingerprinting Codes and Separating Hash Families

    Get PDF
    The thesis examines two related combinatorial objects, namely fingerprinting codes and separating hash families. Fingerprinting codes are combinatorial objects that have been studied for more than 15 years due to their applications in digital data copyright protection and their combinatorial interest. Four well-known types of fingerprinting codes are studied in this thesis; traceability, identifiable parent property, secure frameproof and frameproof. Each type of code is named after the security properties it guarantees. However, the power of these four types of fingerprinting codes is limited by a certain condition. The first known attempt to go beyond that came out in the concept of two-level traceability codes, introduced by Anthapadmanabhan and Barg (2009). This thesis extends their work to the other three types of fingerprinting codes, so in this thesis four types of two-level fingerprinting codes are defined. In addition, the relationships between the different types of codes are studied. We propose some first explicit non-trivial constructions for two-level fingerprinting codes and provide some bounds on the size of these codes. Separating hash families were introduced by Stinson, van Trung, and Wei as a tool for creating an explicit construction for frameproof codes in 1998. In this thesis, we state a new definition of separating hash families, and mainly focus on improving previously known bounds for separating hash families in some special cases that related to fingerprinting codes. We improve upper bounds on the size of frameproof and secure frameproof codes under the language of separating hash families

    Linear time Constructions of some dd-Restriction Problems

    Full text link
    We give new linear time globally explicit constructions for perfect hash families, cover-free families and separating hash functions

    Improved Constructions of Frameproof Codes

    Full text link
    Frameproof codes are used to preserve the security in the context of coalition when fingerprinting digital data. Let Mc,l(q)M_{c,l}(q) be the largest cardinality of a qq-ary cc-frameproof code of length ll and Rc,l=lim⁑qβ†’βˆžMc,l(q)/q⌈l/cβŒ‰R_{c,l}=\lim_{q\rightarrow \infty}M_{c,l}(q)/q^{\lceil l/c\rceil}. It has been determined by Blackburn that Rc,l=1R_{c,l}=1 when l≑1Β (β€Šmodβ€ŠΒ c)l\equiv 1\ (\bmod\ c), Rc,l=2R_{c,l}=2 when c=2c=2 and ll is even, and R3,5=5/3R_{3,5}=5/3. In this paper, we give a recursive construction for cc-frameproof codes of length ll with respect to the alphabet size qq. As applications of this construction, we establish the existence results for qq-ary cc-frameproof codes of length c+2c+2 and size c+2c(qβˆ’1)2+1\frac{c+2}{c}(q-1)^2+1 for all odd qq when c=2c=2 and for all q≑4(mod6)q\equiv 4\pmod{6} when c=3c=3. Furthermore, we show that Rc,c+2=(c+2)/cR_{c,c+2}=(c+2)/c meeting the upper bound given by Blackburn, for all integers cc such that c+1c+1 is a prime power.Comment: 6 pages, to appear in Information Theory, IEEE Transactions o

    Fast Algorithms for Parameterized Problems with Relaxed Disjointness Constraints

    Full text link
    In parameterized complexity, it is a natural idea to consider different generalizations of classic problems. Usually, such generalization are obtained by introducing a "relaxation" variable, where the original problem corresponds to setting this variable to a constant value. For instance, the problem of packing sets of size at most pp into a given universe generalizes the Maximum Matching problem, which is recovered by taking p=2p=2. Most often, the complexity of the problem increases with the relaxation variable, but very recently Abasi et al. have given a surprising example of a problem --- rr-Simple kk-Path --- that can be solved by a randomized algorithm with running time Oβˆ—(2O(klog⁑rr))O^*(2^{O(k \frac{\log r}{r})}). That is, the complexity of the problem decreases with rr. In this paper we pursue further the direction sketched by Abasi et al. Our main contribution is a derandomization tool that provides a deterministic counterpart of the main technical result of Abasi et al.: the Oβˆ—(2O(klog⁑rr))O^*(2^{O(k \frac{\log r}{r})}) algorithm for (r,k)(r,k)-Monomial Detection, which is the problem of finding a monomial of total degree kk and individual degrees at most rr in a polynomial given as an arithmetic circuit. Our technique works for a large class of circuits, and in particular it can be used to derandomize the result of Abasi et al. for rr-Simple kk-Path. On our way to this result we introduce the notion of representative sets for multisets, which may be of independent interest. Finally, we give two more examples of problems that were already studied in the literature, where the same relaxation phenomenon happens. The first one is a natural relaxation of the Set Packing problem, where we allow the packed sets to overlap at each element at most rr times. The second one is Degree Bounded Spanning Tree, where we seek for a spanning tree of the graph with a small maximum degree
    • …
    corecore