共查询到20条相似文献,搜索用时 15 毫秒
1.
Maura Paterson 《Designs, Codes and Cryptography》2007,42(2):195-212
A sliding-window dynamic frameproof code is a scheme for discouraging the piracy of digital broadcasts through the use of
digital fingerprinting. In this paper, we formally define sliding-window dynamic frameproof codes and provide optimal constructions
for a certain class of these schemes. We also discuss bounds on the number of users such schemes can support.
相似文献
2.
For q = p
m
and m ≥ 1, we construct systematic authentication codes over finite field using Galois rings. We give corrections of the construction of [2]. We generalize corresponding systematic authentication codes of [6] in various ways. 相似文献
3.
Koji Nuida Satoshi Fujitsu Manabu Hagiwara Takashi Kitagawa Hajime Watanabe Kazuto Ogawa Hideki Imai 《Designs, Codes and Cryptography》2009,52(3):339-362
It has been proven that the code lengths of Tardos’s collusion-secure fingerprinting codes are of theoretically minimal order with respect to the number of adversarial users (pirates). However, the code lengths can be further reduced as some preceding studies have revealed. In this article we improve a recent discrete variant of Tardos’s codes, and give a security proof of our codes under an assumption weaker than the original Marking Assumption. Our analysis shows that our codes have significantly shorter lengths than Tardos’s codes. For example, when c = 8, our code length is about 4.94% of Tardos’s code in a practical setting and about 4.62% in a certain limit case. Our code lengths for large c are asymptotically about 5.35% of Tardos’s codes. A part of this work was presented at 17th Applied Algebra, Algebraic Algorithms, and Error Correcting Codes (AAECC-17), Bangalore, India, December 16–20, 2007. 相似文献
4.
5.
Khmaies Ouahada Theo G. Swart Hendrik C. Ferreira Ling Cheng 《Designs, Codes and Cryptography》2008,48(2):141-154
We investigate binary sequences which can be obtained by concatenating the columns of (0,1)-matrices derived from permutation sequences. We then prove that these binary sequences are subsets of a surprisingly diverse ensemble of codes, namely the Levenshtein codes, capable of correcting insertion/deletion errors; spectral null codes, with spectral nulls at certain frequencies; as well as being subsets of run-length limited codes, Nyquist null codes and constant weight codes. This paper was presented in part at the IEEE Information Theory Workshop, Chengdu, China, October, 2006. 相似文献
6.
Cyclic codes and their various generalizations, such as quasi-twisted (QT) codes, have a special place in algebraic coding theory. Among other things, many of the best-known or optimal codes have been obtained from these classes. In this work we introduce a new generalization of QT codes that we call multi-twisted (MT) codes and study some of their basic properties. Presenting several methods of constructing codes in this class and obtaining bounds on the minimum distances, we show that there exist codes with good parameters in this class that cannot be obtained as QT or constacyclic codes. This suggests that considering this larger class in computer searches is promising for constructing codes with better parameters than currently best-known linear codes. Working with this new class of codes motivated us to consider a problem about binomials over finite fields and to discover a result that is interesting in its own right. 相似文献
7.
8.
New families of unit memory as well as multi-memory nonbinary convolutional codes are constructed algebraically in this paper. These convolutional codes are derived from the class of group character codes. The proposed codes have basic generator matrices, consequently, they are noncatastrophic. Additionally, the new code parameters are better than the ones available in the literature. 相似文献
9.
Stabilizer codes obtained via the CSS code construction and the Steane's enlargement of subfield-subcodes and matrix-product codes coming from generalized Reed–Muller, hyperbolic and affine variety codes are studied. Stabilizer codes with good quantum parameters are supplied; in particular, some binary codes of lengths 127 and 128 improve the parameters of the codes in http://www.codetables.de. Moreover, non-binary codes are presented either with parameters better than or equal to the quantum codes obtained from BCH codes by La Guardia or with lengths that cannot be reached by them. 相似文献
10.
《Discrete Mathematics》2023,346(7):113391
Symbol-pair codes are proposed to guard against pair-errors in symbol-pair read channels. The minimum symbol-pair distance is of significance in determining the error-correcting capability of a symbol-pair code. One of the central themes in symbol-pair coding theory is the constructions of symbol-pair codes with the largest possible minimum symbol-pair distance. Maximum distance separable (MDS) and almost maximum distance separable (AMDS) symbol-pair codes are optimal and sub-optimal regarding the Singleton bound, respectively. In this paper, six new classes of AMDS symbol-pair codes are explicitly constructed through repeated-root cyclic codes. Remarkably, one class of such codes has unbounded lengths and the minimum symbol-pair distance of another class can reach 13. 相似文献
11.
This paper extends the concepts from cyclic duadic codes to negacyclic codes over Fq (q an odd prime power) of oddly even length. Generalizations of defining sets, multipliers, splittings, even-like and odd-like codes are given. Necessary and sufficient conditions are given for the existence of self-dual negacyclic codes over Fq and the existence of splittings of 2N, where N is odd. Other negacyclic codes can be extended by two coordinates in a way to create self-dual codes with familiar parameters. 相似文献
12.
13.
1. IntroductionIn ant omat ic--rep eat-- request (ARQ ) error- cont rol syst em 3 t he u-ndet ect ed error probability (UEP) of an error-detecting code is one of the most importallt performance characteristics. There are a number of papers dedicated to examining the error detection capabilityfor some well known classes of linear codes, suCh as Reed-Solomon codes, BCH codes andReed-Muller codes. For a general introduction to the theory of error detecting codes, werefer the readers to [if … 相似文献
14.
We proposed a new public-key traitor tracing scheme with revocation capability using dynamic shares and entity revocation techniques. Our schemes traitor tracing and revocation programs cohere tightly. The size of the enabling block of our scheme is independent of the number of receivers. Each receiver holds one decryption key only. The distinct feature of our scheme is that when traitors are found, we can revoke their private keys (up to some threshold z) without updating the private keys of other receivers. In particular, no revocation messages are broadcast and all receivers do nothing. Previously proposed revocation schemes need update existing keys and entail large amount of broadcast messages. Our traitor tracing algorithm works in a black-box way. It is conceptually simple and fully k-resilient, that is, it can find all traitors if the number of them is k or less. The encryption algorithm of our scheme is semantically secure assuming that the decisional Diffie-Hellman problem is hard.AMS Classification: 11T71, 68P30 相似文献
15.
We show how the use of graded alphabets allows one to provide simpler proofs of some results on free monoids and free Lie algebras. We first generalize to graded alphabets the characterization of the length distributions of circular codes. We also show that the existence of a circular code with a given distribution of degrees is equivalent to the existence of an embedding of Lie algebras. We finally give a generalization to graded alphabets of the famous result of Eastman on comma free codes of odd degree. 相似文献
16.
17.
Anne Desideri Bracco 《Discrete Applied Mathematics》2008,156(18):3362-3375
18.
As a generalization of cyclic codes, constacyclic codes is an important and interesting class of codes due to their nice algebraic structures and various applications in engineering. This paper is devoted to the study of the q-polynomial approach to constacyclic codes. Fundamental theory of this approach will be developed, and will be employed to construct some families of optimal and almost optimal codes in this paper. 相似文献
19.
Cyclically permutable codes have been studied for several applications involving synchronization, code-division multiple-access (CDMA) radio systems and optical CDMA. The usual emphasis is on finding constant weight cyclically permutable codes with the maximum number of codewords. In this paper the question of when a particular error-correcting code is equivalent (by permutation of the symbols) to a cyclically permutable code is addressed. The problem is introduced for simplex codes and a motivating example is given. In the final section it is shown that the construction technique may be applied in general to cyclic codes. 相似文献
20.