Papers
Topics
Authors
Recent
Search
2000 character limit reached

Probabilistic Existence Results for Parent-Identifying Schemes

Published 3 Jun 2019 in cs.IT, cs.DM, math.CO, and math.IT | (1906.01031v1)

Abstract: Parent-identifying schemes provide a way to identify causes from effects for some information systems such as digital fingerprinting and group testing. In this paper, we consider combinatorial structures for parent-identifying schemes. First, we establish an equivalent relationship between parent-identifying schemes and forbidden configurations. Based on this relationship, we derive probabilistic existence lower bounds for two related combinatorial structures, that is, $t$-parent-identifying set systems ($t$-IPPS) and $t$-multimedia parent-identifying codes ($t$-MIPPC), which are used in broadcast encryption and multimedia fingerprinting respectively. The probabilistic lower bound for the maximum size of a $t$-IPPS has the asymptotically optimal order of magnitude in many cases, and that for $t$-MIPPC provides the asymptotically optimal code rate when $t=2$ and the best known asymptotic code rate when $t\geq 3$. Furthermore, we analyze the structure of $2$-IPPS and prove some bounds for certain cases.

Citations (11)

Summary

Paper to Video (Beta)

Whiteboard

No one has generated a whiteboard explanation for this paper yet.

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Continue Learning

We haven't generated follow-up questions for this paper yet.

Collections

Sign up for free to add this paper to one or more collections.