Fredman-Kolmo´s bounds and information theory
SIAM Journal on Algebraic and Discrete Methods
New bounds for perfect hashing via information theory
European Journal of Combinatorics
Introduction to algorithms
On codes with the identifiable parent property
Journal of Combinatorial Theory Series A
Journal of Combinatorial Theory Series A
A Hypergraph Approach to the Identifying Parent Property: The Case of Multiple Parents
SIAM Journal on Discrete Mathematics
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
An upper bound on the size of a code with the k-identifiable parent property
Journal of Combinatorial Theory Series A
Collusion-secure fingerprinting for digital data
IEEE Transactions on Information Theory
Combinatorial properties of frameproof and traceability codes
IEEE Transactions on Information Theory
The Lovász Local Lemma and Its Applications to some Combinatorial Arrays
Designs, Codes and Cryptography
Algorithmic construction of sets for k-restrictions
ACM Transactions on Algorithms (TALG)
A bound on the size of separating hash families
Journal of Combinatorial Theory Series A
IWCC '09 Proceedings of the 2nd International Workshop on Coding and Cryptology
The Budgeted Unique Coverage Problem and Color-Coding
CSR '09 Proceedings of the Fourth International Computer Science Symposium in Russia on Computer Science - Theory and Applications
Linear time algorithms for finding a dominating set of fixed size in degenerated graphs
COCOON'07 Proceedings of the 13th annual international conference on Computing and Combinatorics
Hi-index | 0.00 |
Let C be a code of length n over an alphabet of q letters. For a pair of integers 2 ≤ t u, C is (t,u)-hashing if for any two subsets T, U ⊂C, satisfying T ⊂ U, |T| = t, |U| = u, there is a coordinate 1 ≤ i ≤ n such that for any x ∈ T, y ∈ U - x, x and y differ in the ith coordinate. This definition, generalizing the standard notion of a t-hashing family, is motivated by an application in designing the so-called parent identifying codes, used in digital fingerprinting. In this paper, we provide lower and upper bounds on the best possible rate of (t, u)-hashing families for fixed t, u and growing n. We also describe an explicit construction of (t, u)-hashing families. The obtained lower bound on the rate of (t, u)-hashing families is applied to get a new lower bound on the rate of t-parent identifying codes.