strongly separable codes
play

Strongly Separable Codes Ying Miao joint work with Minquan Cheng - PowerPoint PPT Presentation

Strongly Separable Codes Ying Miao joint work with Minquan Cheng and Jing Jiang University of Tsukuba, Japan March 16, 2015, ALCOMA 15 1 1 Introduction Exam. 1.1 A (3 , 4 , 2) code C = { c 1 , c 2 , c 3 , c 4 } . c 1 c 2 c 3 c 4 c 1 c 2 c 3 ,


  1. Strongly Separable Codes Ying Miao joint work with Minquan Cheng and Jing Jiang University of Tsukuba, Japan March 16, 2015, ALCOMA 15 1

  2. 1 Introduction Exam. 1.1 A (3 , 4 , 2) code C = { c 1 , c 2 , c 3 , c 4 } . c 1 c 2 c 3 c 4 c 1 c 2 c 3 , c 4 8 9 8 9 8 9 8 9 0 1 1 0 0 0 1 0 0 0 > > > > > > > > = ⇒ > > > > > > > > < = < = < = < = B C 0 1 0 1 0 1 0 1 B C @ A > > > > > > > > > > > > > > > > 0 0 1 1 0 0 1 1 : ; : ; : ; : ; c 1 ∪ c 2 c 1 ∪ c 3 c 1 ∪ c 4 c 2 ∪ c 3 c 2 ∪ c 4 c 3 ∪ c 4 8 9 8 9 8 9 8 9 8 9 8 9 0 , 1 0 , 1 0 , 1 0 0 0 > > > > > > > > > > > > > > > > > > > > > > > > < = < = < = < = < = < = 0 , 1 0 0 , 1 0 , 1 1 0 , 1 > > > > > > > > > > > > > > > > > > > > > > > > 0 0 , 1 0 , 1 0 , 1 0 , 1 1 : ; : ; : ; : ; : ; : ; 2

  3. Question : Given a subset of 8 9 0 , 1 > > > > < = 0 , 1 > > > > 0 , 1 : ; say, 8 9 0 > > > > < = 1 > > > > 0 , 1 : ; Can we trace back to the codewords c 2 , c 4 who produced it? 3

  4. Answer : Yes, we can. The subsets produced by up to two codewords are all distinct. Remark : Such kind of codes are used in multimedia fingerprinting where the identification of malicious authorized users taking part in the linear collusion attack is required to prevent pirate copies of multimedia contents. 4

  5. 2 General Definitions and Tracing Properties Let n, M, q be positive integers, and Q = { 0 , 1 , . . . , q − 1 } . A set C = { c 1 , c 2 , . . . , c M } ⊆ Q n is called an ( n, M, q ) code and each c i a codeword (or a fingerprint). ∀ C ′ ⊆ C , define the descendant code of C ′ as desc ( C ′ ) = C ′ (1) × · · · × C ′ ( n ) , where C ′ ( i ) = { c ( i ) ∈ Q | c = ( c (1) , . . . , c ( n )) T ∈ C ′ } . Remark : desc ( C ′ ) consists of the n -tuples that could be produced by a coalition holding the codewords (fingerprints) in C ′ . 5

  6. Def. 2.1 Let C be an ( n, M, q ) code and t ≥ 2 be an integer. C is a t -separable code, t -SC( n, M, q ), if ∀ distinct C 1 , C 2 ⊆ C with |C 1 | ≤ t, |C 2 | ≤ t , we have desc ( C 1 ) � = desc ( C 2 ). Given desc ( C 0 ), to trace C 0 , we need check desc ( C ′ ) for all Tracing : C ′ ⊆ C (separable code) with |C ′ | ≤ t , that is, the computational complexity of the tracing is O ( M t ). Question : Is it possible to find an efficient tracing, say, with computational complexity O ( M )? Answer : In general, NOT . But in some cases, OK . 6

  7. Def. 2.2 Let C be an ( n, M, q ) code and t ≥ 2 be an integer. C is a t -frameproof code, t -FPC( n, M, q ), if ∀ C ′ ⊆ C with |C ′ | = t , and ∀ c ∈ C \ C ′ , ∃ 1 ≤ i ≤ n s.t. c ( i ) �∈ desc ( C ′ )( i ). Exam. 2.3 A 2-FPC(3 , 3 , 2) C . Any t -FPC( n, M, q ) is a t -SC( n, M, q ). 8 9 0 1 1 0 0 0 > > > > < = B C C = desc ( C 0 ) = 0 1 0 0 , 1 B C @ A > > > > 0 0 1 0 , 1 : ; Tracing : Given desc ( C 0 ), to trace C 0 , we eliminate all codewords c with c ( i ) �∈ desc ( C 0 )( i ). From the definition of FPC, the set of remaining codewords is necessarily C 0 . The computational complexity of the tracing is O ( M ). 7

  8. 3 Strongly Separable Codes Question : The constraints posed on frameproof codes are quite strong so that the number of codewords is not large enough. Can we find a new code weaker than a frameproof code but stronger than a separable code, so that the its computational complexity is the same with a frameproof code, i.e., O ( M ), but the number of codewords in such a code is larger than that of a frameproof code? Answer : Yes, we can. 8

  9. Def. 3.1 Let C be an ( n, M, q ) code and t ≥ 2 be an integer. C is a strongly t -separable code, t -SSC( n, M, q ), if ∀ C 0 ⊆ C , |C 0 | ≤ t , we have ′ = C 0 , ∩ C C ′ ∈ S ( C 0 ) ′ ⊆ C | desc ( C ′ ) = desc ( C 0 ) } . where S ( C 0 ) = {C Exam. 3.2 A 2-SSC(3 , 4 , 2) C . Any t -SSC( n, M, q ) is a t -SC( n, M, q ). 8 9 0 1 1 0 0 0 0 > > > > < = B C C = desc ( C 0 ) = 0 1 0 0 0 , 1 B C @ A > > > > 0 0 1 0 0 , 1 : ; Tracing : Given desc ( C 0 ), to trace C 0 , we eliminate all codewords c with c ( i ) �∈ desc ( C 0 )( i ). The computational complexity of the tracing is O ( M ). 9

  10. It is obvious that the set 0 1 0 0 0 B C C L = 1 0 0 B C @ A 0 1 0 of remaining codewords necessarily contains C 0 . We have to find the exact C 0 . • C L ∈ S ( C 0 ), that is, desc ( C L ) = desc ( C 0 ). C ′ ∈ S ( C 0 ) C ′ , ∃ 1 ≤ j ≤ n s.t. x ( j ) = 1 , c ( j ) = 0, or • ∀ x ∈ C 0 = ∩ x ( j ) = 0 , c ( j ) = 1 for any c ∈ C L \ { x } . Otherwise desc ( C L \ { x } ) = C ′ ∈ S ( C 0 ) C ′ , a contradiction. desc ( C L ), i.e., C L \ { x } ∈ S ( C 0 ), so x �∈ T C ′ ∈ S ( C 0 ) C ′ is a colluder. Otherwise, ∀ C ′ ∈ S ( C 0 ), • Any x ∈ C 0 = ∩ C ′ \ { x } ∈ S ( C 0 ), so x �∈ T C ′ ∈ S ( C 0 ) C ′ , a contradiction. 10

  11. It is obvious that the set 0 1 0 1 0 0 0 0 0 B C B C C L = = C 0 = 1 0 0 ⇒ 1 0 B C B C @ A @ A 0 1 0 0 1 of remaining codewords necessarily contains C 0 . We have to find the exact C 0 . • C L ∈ S ( C 0 ), that is, desc ( C L ) = desc ( C 0 ). C ′ ∈ S ( C 0 ) C ′ , ∃ 1 ≤ j ≤ n s.t. x ( j ) = 1 , c ( j ) = 0, or • ∀ x ∈ C 0 = ∩ x ( j ) = 0 , c ( j ) = 1 for any c ∈ C L \ { x } . Otherwise desc ( C L \ { x } ) = C ′ ∈ S ( C 0 ) C ′ , a contradiction. desc ( C L ), i.e., C L \ { x } ∈ S ( C 0 ), so x �∈ T C ′ ∈ S ( C 0 ) C ′ is a colluder. Otherwise, ∀ C ′ ∈ S ( C 0 ), • Any x ∈ C 0 = ∩ C ′ \ { x } ∈ S ( C 0 ), so x �∈ T C ′ ∈ S ( C 0 ) C ′ , a contradiction. 11

  12. 4 Constructions Thm. 4.1 (Concatenation) A t -SSC( n, M, q ) implies a t -SSC ( nq, M, 2). Thm. 4.2 A code C is a 2-SSC(2 , M, q ) iff it is a 2-SC(2 , M, q ). Lemma 4.3 (Cheng et. al., 2012, 2015) Let k ≥ 2 be a prime power. Then ∃ optimal 2-SC(2 , M ≈ q 3 / 2 , q ) for any q ∈ { k 2 − 1 , k 2 + k − 2 , k 2 + k − 1 , k 2 + k, k 2 + k + 1 } . Coro. 4.4 Let k ≥ 2 be a prime power. Then ∃ optimal 2-SSC (2 , M ≈ q 3 / 2 , q ) for any q ∈ { k 2 − 1 , k 2 + k − 2 , k 2 + k − 1 , k 2 + k, k 2 + k + 1 } . Remark : A 2-FPC(2 , M, q ) can have at most 2 q codewords (Blackburn, 2003), but the above 2-SSC(2 , M, q ) can have about q 3 / 2 codewords. 12

  13. A Direct Construction Let q be a positive integer, s a non-negative integer, 0 ≤ s ≤ q , q − s odd. Let Q = {∞ 0 , . . . , ∞ s − 1 } ∪ Z q − s . Let 0 1 0 1 ∞ i 0 0 0 · · · 0 i B C B C M i = M s = 0 ∞ i i 0 1 · · · q − s − 1 B C B C @ A @ A 0 ∞ 0 2 · · · 2( q − s − 1) i Define D j = { c + g | c ∈ M j , g ∈ Z q − s } , and C = ∪ 0 ≤ j ≤ s D j . Thm. 4.5 C is a 2-SSC(3 , q 2 + sq − 2 s 2 , q ). 13

  14. 8 (9 q 2 − w 2 ) , q ), with m ≡ q Coro. 4.6 ∀ q ∈ N, ∃ 2-SSC(3 , 1 (mod 8), and  4 − m, if m ≡ 0 (mod 4) ,  w = min { m, 8 − m } , otherwise  Remark : A 2-FPC(3 , M, q ) can have at most q 2 codewords (Bazrafshan-Tran van Trung, 2008), but the above 2-SSC(3 , M, q ) 8 q 2 codewords. It is even possible to construct can have about 9 2-SSC(3 , M, q ) with more codewords. 14

  15. Problem : What is the largest number of codewords in a t -SSC ( n, M, q )? 15

  16. Any Questions? Thanks for Your Attention! 16

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend