Abstract | ||
---|---|---|
Parent-identifying schemes provide a way to identify causes from effects for some information systems, such as digital fingerprinting and group testing. In this paper, we consider the combinatorial structures for parent-identifying schemes. First, we establish an equivalent relationship between the parent-identifying schemes and forbidden configurations. Based on this relationship, we derive the probabilistic existence lower bounds for two related combinatorial structures, that is,
<inline-formula xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"> <tex-math notation="LaTeX">$t$ </tex-math></inline-formula>
-parent-identifying set systems (
<inline-formula xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"> <tex-math notation="LaTeX">$t$ </tex-math></inline-formula>
-IPPS) and
<inline-formula xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"> <tex-math notation="LaTeX">$t$ </tex-math></inline-formula>
-multimedia parent-identifying codes (
<inline-formula xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"> <tex-math notation="LaTeX">$t$ </tex-math></inline-formula>
-MIPPC), which are used in broadcast encryption and multimedia fingerprinting, respectively. The probabilistic lower bound for the maximum size of a
<inline-formula xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"> <tex-math notation="LaTeX">$t$ </tex-math></inline-formula>
-IPPS has the asymptotically optimal order of magnitude in many cases, and that for
<inline-formula xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"> <tex-math notation="LaTeX">$t$ </tex-math></inline-formula>
-MIPPC provides the asymptotically optimal code rate when
<inline-formula xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"> <tex-math notation="LaTeX">$t=2$ </tex-math></inline-formula>
and the best known asymptotic code rate when
<inline-formula xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"> <tex-math notation="LaTeX">$t\ge 3$ </tex-math></inline-formula>
. Furthermore, we analyze the structure of 2-IPPS and prove some bounds for certain cases. |
Year | DOI | Venue |
---|---|---|
2019 | 10.1109/TIT.2019.2927020 | IEEE Transactions on Information Theory |
Keywords | DocType | Volume |
Probabilistic logic,Encryption,Testing,Technological innovation,Multimedia systems,Indexes | Journal | abs/1906.01031 |
Issue | ISSN | Citations |
10 | 0018-9448 | 0 |
PageRank | References | Authors |
0.34 | 0 | 4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Yujie Gu | 1 | 96 | 9.79 |
M. Cheng | 2 | 154 | 20.36 |
Grigory Kabatiansky | 3 | 11 | 5.68 |
Ying Miao | 4 | 491 | 43.85 |