Traceability code[1] 

Description

An IPP code with which it is possible to detect a parent of a given pirated descendent by finding the closest codeword to that descendant.

Codes with strong traceability trace at least one member of a group that has constructed a pirate decoder (i.e., a generic pirate decryption process [1]). A code with weak traceability has the ability to ensure that no group is able to frame another user [2].

Rate

Suppose \(n\) is the number of users, \(k\) is the number of users known by the pirates, and \(p\) is the probability that the pirates cannot be traced. An open (public) resilient scheme using a hash function has the personal keys of the users consisting of \(O(k^{2}\log n)\) decryption keys, which is the amount of decryptions needed to reveal the information. The amount of data redundancy overhead is about \(O(k^{4}\log n)\) [1].

A secret resilient scheme using a hash function has the personal keys of the users consisting of \(O(k \log(n/p))\) decryption keys, which is the amount of decryptions needed to reveal the information. The amount of data redundancy overhead is about \(O(k^{2} \log(n/p))\) [1].

A threshold (secret) scheme using a hash function that is successful against pirates which decrypt with probability \(> q\), has the personal keys of the users consisting of \((4k/3q)\log(n/p)\) decryption keys (note that this is the same as in the secret resilient scheme above). These types of schemes only need order \(O(1)\) decryption operations performed by users to decrypt the information successfully. Finally, the amount of data redundancy overhead is 4k encrypted keys, a large improvement compared to the above [1].

Realizations

Broadcast messages, pay-per-view movies, and protecting copyrighted online material [2].

Notes

Note that in the feature section above, the hash function maps the users into a set of \(2k^{2}\) decryption keys [1].For code tables, see Refs. [1,2].

Parent

Cousin

References

[1]
B. Chor et al., “Tracing traitors”, IEEE Transactions on Information Theory 46, 893 (2000) DOI
[2]
J. N. Staddon, D. R. Stinson, and Ruizhong Wei, “Combinatorial properties of frameproof and traceability codes”, IEEE Transactions on Information Theory 47, 1042 (2001) DOI
Page edit log

Your contribution is welcome!

on github.com (edit & pull request)— see instructions

edit on this site

Zoo Code ID: traceability

Cite as:
“Traceability code”, The Error Correction Zoo (V. V. Albert & P. Faist, eds.), 2024. https://errorcorrectionzoo.org/c/traceability
BibTeX:
@incollection{eczoo_traceability, title={Traceability code}, booktitle={The Error Correction Zoo}, year={2024}, editor={Albert, Victor V. and Faist, Philippe}, url={https://errorcorrectionzoo.org/c/traceability} }
Share via:
Twitter | Mastodon |  | E-mail
Permanent link:
https://errorcorrectionzoo.org/c/traceability

Cite as:

“Traceability code”, The Error Correction Zoo (V. V. Albert & P. Faist, eds.), 2024. https://errorcorrectionzoo.org/c/traceability

Github: https://github.com/errorcorrectionzoo/eczoo_data/edit/main/codes/classical/properties/block/copyright/traceability.yml.