Prikladnaya Diskretnaya Matematika
RUS  ENG    JOURNALS   PEOPLE   ORGANISATIONS   CONFERENCES   SEMINARS   VIDEO LIBRARY   PACKAGE AMSBIB  
General information
Latest issue
Archive
Impact factor

Search papers
Search references

RSS
Latest issue
Current issues
Archive issues
What is RSS



Prikl. Diskr. Mat.:
Year:
Volume:
Issue:
Page:
Find






Personal entry:
Login:
Password:
Save password
Enter
Forgotten password?
Register


Prikladnaya Diskretnaya Matematika, 2019, Number 44, Pages 67–93
DOI: https://doi.org/10.17223/20710410/44/6
(Mi pdm662)
 

This article is cited in 4 scientific papers (total in 4 papers)

Applied Coding Theory

On application of algebraic geometry codes of $L$-construction in copy protection

D. V. Zagumennova, V. V. Mkrtichyanb

a Southern Federal University, Rostov-on-Don, Russia
b FGANU NII «Specvuzavtomatika», Rostov-on-Don, Russia
Full-text PDF (808 kB) Citations (4)
References:
Abstract: Traceability schemes which are applied to the broadcast encryption can prevent unauthorized parties from accessing the distributed data. In a traceability scheme, a distributor encrypts the data and gives each authorized user a unique key suit to decrypt the data. This suit uniquely identifies the recipient and therefore allows the tracing of the source of an unauthorized redistribution. A widely used approach to the constructing good traceability scheme is the use of error-correcting codes with a suitable minimum distance and efficient decoding algorithms. The paper deals with the usage of algebraic geometry codes (AG-codes) of $L$-construction and Sudan–Guruswami list decoding algorithms in these schemes. We suggest the problem of constructing traceability AG-codes and obtain sufficient conditions for applying them. Let $C \subset {\mathbb F_q^n}$ be the algebraic geometry code constructed using curve of genus $g$ and divisor of degree $\alpha$. Firstly, if $c < \sqrt{n/\alpha}$, then $C$ is a traceability code when the number of attackers is a maximum of $c$. Secondly, if $\alpha \ge \log_qN+g-1$, then $C$ can be used to build traceability schemes maintaining $N$ users. Finally, we obtain several cumbersome bounds on the number of intruders within which it is possible to use Sudan–Guruswami hard- and soft- decision list decoding algorithms for tracing the unauthorized redistribution source. Based on these derived conditions and some other lemmas, the algorithm for suitable one-point AG-code construction is presented. The algorithm can be polynomially reduced to the Riemann–Roch space basis construction problem. Much attention is given to the algorithm validity and its sample execution. Besides, the paper gives a brief description of AG-codes and Sudan–Guruswami hard- and soft- decision list decoding algorithms.
Keywords: error-correcting codes, traceability schemes, algebraic geometry codes.
Bibliographic databases:
Document Type: Article
UDC: 004.056.5
Language: Russian
Citation: D. V. Zagumennov, V. V. Mkrtichyan, “On application of algebraic geometry codes of $L$-construction in copy protection”, Prikl. Diskr. Mat., 2019, no. 44, 67–93
Citation in format AMSBIB
\Bibitem{ZagMkr19}
\by D.~V.~Zagumennov, V.~V.~Mkrtichyan
\paper On application of algebraic geometry codes of~$L$-construction in copy protection
\jour Prikl. Diskr. Mat.
\yr 2019
\issue 44
\pages 67--93
\mathnet{http://mi.mathnet.ru/pdm662}
\crossref{https://doi.org/10.17223/20710410/44/6}
\elib{https://elibrary.ru/item.asp?id=38555963}
Linking options:
  • https://www.mathnet.ru/eng/pdm662
  • https://www.mathnet.ru/eng/pdm/y2019/i2/p67
  • This publication is cited in the following 4 articles:
    Citing articles in Google Scholar: Russian citations, English citations
    Related articles in Google Scholar: Russian articles, English articles
    Прикладная дискретная математика
     
      Contact us:
     Terms of Use  Registration to the website  Logotypes © Steklov Mathematical Institute RAS, 2024