Secure frameproof codes, key distribution patterns, group testing algorithms and related structures

From MaRDI portal
Publication:1569877

DOI10.1016/S0378-3758(99)00131-7zbMath1054.94013OpenAlexW2091887150WikidataQ60962397 ScholiaQ60962397MaRDI QIDQ1569877

Tran van Trung, Rui Zhong Wei, Douglas R. Stinson

Publication date: 2000

Published in: Journal of Statistical Planning and Inference (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1016/s0378-3758(99)00131-7




Related Items (62)

Almost Optimal Cover-Free FamiliesStrongly separable codesA group testing method for finding patterns in dataAlmost separating and almost secure frameproof codes over \(q\)-ary alphabetsPerfect Hash Families: Constructions and ExistenceBounds and constructions for \(\overline{3}\)-separable codes with length 3Separating Hash Families: A Johnson-type bound and New ConstructionsOn generalizations of separating and splitting familiesA sequence approach to linear perfect hash familiesGeneralised cumulative arrays in secret sharingSecret sharing schemes with partial broadcast channelsExplicit constructions of separating hash families from algebraic curves over finite fieldsOn Symmetric Designs and Binary 3-Frameproof CodesUnnamed ItemImproved bounds for separating hash familiesOn optimal cryptographic key derivationLinear Time Constructions of Some $$d$$-Restriction ProblemsOn tight bounds for binary frameproof codesNon-adaptive complex group testing with multiple positive setsStrengthening hash families and compressive sensingThe design of (almost) disjunct matrices by evolutionary algorithmsDetecting arrays for effects of single factorsA hierarchical framework for recovery in compressive sensingNew combinatorial structures with applications to efficient group testing with inhibitorsBounds for separating hash familiesWide-sense 2-frameproof codesConstructions of generalized superimposed codes with applications to group testing and conflict resolution in multiple access channels.Splitting systems and separating systems.Generalized cover-free families.Uniqueness of some optimal superimposed codesSome intriguing upper bounds for separating hash familiesNew bounds on \(\bar{2}\)-separable codes of length 2Some new bounds for cover-free familiesConstructions of almost secure frameproof codes with applications to fingerprinting schemesA recursive construction for perfect hash familiesNon-adaptive Complex Group Testing with Multiple Positive SetsAsymptotically optimal \(\overline {2}\)-separable codes with length 4On generalized separating hash familiesGeometric constructions of optimal linear perfect hash families2-secure codes from 2-SFP codesA tight bound for frameproof codes viewed in terms of separating hash familiesThreshold and Majority Group TestingRandomized Post-optimization for t-RestrictionsA bound on the size of separating hash familiesImproved bounds on 2-frameproof codes with length 4Explicit constructions of perfect hash families from algebraic curves over finite fieldsBinary fingerprinting codesRecursive constructions of secure codes and hash families using difference function families.New constructions for IPP codesConstructions and bounds for separating hash familiesBroadcast authentication for group communicationExplicit constructions for perfect hash familiesLinear hash families and forbidden configurationsArrays for combinatorial interaction testing: a review on constructive approachesOn optimal superimposed codesError-tolerant nonadaptive interval group testing with density-based testsRESILIENT LKH: SECURE MULTICAST KEY DISTRIBUTION SCHEMESUnnamed ItemDistributing hash families with few rowsPerfect hash families: Probabilistic methods and explicit constructionsDistributing the encryption and decryption of a block cipherFrameproof codes against limited coalitions of pirates



Cites Work


This page was built for publication: Secure frameproof codes, key distribution patterns, group testing algorithms and related structures