Analysis of properties of \(q\)-ary Reed-Muller error-correcting codes viewed as codes for copyright protection. (English. Russian original) Zbl 1396.94108

Probl. Inf. Transm. 51, No. 4, 398-408 (2015); translation from Probl. Peredachi Inf. 51, No. 4, 99-111 (2015).
Summary: We consider a data protection scheme where error-correcting codes can be used for efficient protection against unauthorized copying organized by coalitions of cardinality \(c \in \mathbb{N}\) of malicious users. We find limits of range of the parameters of prospective \(q\)-ary Reed-Muller codes for which these codes are \(c\)-TA and \(c\)-FP codes for copyright protection.


94B05 Linear codes (general theory)
Full Text: DOI


[1] Kabatiansky, G.A., Codes for copyright protection: the case of two pirates, Probl. Peredachi Inf., 41, 123-127, (2005)
[2] Silverberg, A.; Staddon, J.; Walker, J.L., Efficient traitor tracing algorithms using List decoding, advances in cryptology¡ªASIACRYPT’2001 (proc. 7th int. conf. on the theory and application of cryptology and information security, gold coast, Australia, dec. 9-13, 2001), Lect. Notes Comp. Sci., 2248, 175-192, (2001)
[3] Staddon, J.N.; Stinson, D.R.; Wei, R., Combinatorial properties of frameproof and traceability codes, IEEE Trans. Inform. Theory, 47, 042-1049, (2001) · Zbl 1001.94032
[4] Deundyak, V.M.; Mkrtichyan, V.V., Investigation of the limits of applicability of an information protection scheme based on Reed-Solomon codes, Diskretn. Anal. Issled. Oper., 18, 21-38, (2011) · Zbl 1249.94027
[5] Deundyak, V.M.; Mkrtichyan, V.V., Mathematical model of an efficient scheme of special broadcast encrypion and investigation of its applicability limits, Izv. Vyssh. Uchebn. Zaved. Sev.-Kavk. Reg. Estestv. Nauki, 1, 5-8, (2009)
[6] Barg, A.; Blakley, G.R.; Kabatiansky, G.A., Digital fingerprinting codes: problem statements, constructions, identification of traitors, IEEE Trans. Inform. Theory, 49, 852-865, (2003) · Zbl 1063.94079
[7] Barg, A.; Kabatiansky, G., A class of I.P.P. codes with efficient identification, J. Complexity, 20, 137-147, (2004) · Zbl 1069.68045
[8] Blackburn, S.R.; Etzion, T.; Ng, S.-L., Traceability codes, J. Combin. Theory Ser. A, 117, 049-1057, (2010) · Zbl 1230.94004
[9] Fernández, M.; Cotrina, J.; Soriano, M.; Domingo, N., A note about the traceability properties of linear codes, proc. 10th int. conf. on information security and cryptology (ICISC’2007), Seoul, Korea, nov. 29-30, 2007, Lect. Notes Comp. Sci., 4817, 251-258, (2007) · Zbl 1337.94104
[10] Hollmann, H.D.L.; Lint, J.H.; Linnartz, J.-P.; Tolhuizen, L.M.G.M., On codes with the identifiable parent property, J. Combin. Theory Ser. A, 82, 21-133, (1998) · Zbl 0910.05070
[11] Jin, H.; Blaum, M., Combinatorial properties for traceability codes using error correcting codes, IEEE Trans. Inform. Theory, 53, 804-808, (2007) · Zbl 1310.94237
[12] Trung, T.; Martirosyan, S., On a class of traceability codes, Des. Codes Cryptogr., 31, 25-132, (2004) · Zbl 1042.94019
[13] Yevpak, S.A.; Mkrtichyan, V.V., Investigating the possibility of applying q-ary Reed-muller codes in special broadcast encrypion schemes, Izv. Vyssh. Uchebn. Zaved. Sev.-Kavk. Reg. Estestv. Nauki, 5, 11-15, (2011)
[14] Yevpak, S.A. and Mkrtichyan, V.V., Application of q-ary Reed-Muller Codes in Special Broadcast Encrypion Schemes, in Trudy nauchnoi shkoly I.B. Simonenko (Studies of I.B. Simonenko Scientific School), Rostov-on-Don: Yuzhn. Federal. Univ., 2010, pp. 93-99.
[15] Delsarte, P.; Goethals, J.-M.; MacWilliams, F.J., On generalized Reed-muller codes and their relatives, Inform. Control, 16, 403-442, (1970) · Zbl 0267.94014
[16] Chor, B.; Fiat, A.; Naor, M., Tracing traitors, advances in cryptology¡ªCRYPTO’94 (proc. 14th ann. int. cryptology conf., Santa Barbara, CA,USA, aug. 21-25, 1994), Lect. Notes Comp. Sci., 839, 257-270, (1994)
[17] Moreira, J. F.; ndez, M.; Soriano, M., On the relationship between the traceability properties of Reed-Solomon codes, Adv. Math. Commun., 6, 467-478, (2012) · Zbl 1350.94070
[18] Yevpak, S.A.; Mkrtichan, V.V., Applicability conditions for q-ary Reed-muller codes in traitor tracing, Vladikavkaz. Mat. Zh., 16, 38-45, (2014) · Zbl 1361.94057
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. It attempts to reflect the references listed in the original paper as accurately as possible without claiming the completeness or perfect precision of the matching.