Combinational constructions of splitting authentication codes with perfect secrecy

被引:0
|
作者
Ji, Lijun [1 ]
Liang, Miao [2 ]
Wang, Yanting [1 ]
机构
[1] Soochow Univ, Dept Math, Suzhou 215006, Peoples R China
[2] Suzhou Vocat Univ, Dept Math & Phys, Suzhou 215104, Peoples R China
关键词
Group divisible designs; Splitting packing designs; Splitting authentication codes; Robust (2,2)-threshold; DESIGNS;
D O I
10.1007/s10623-022-01092-6
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Splitting authentication codes were first introduced by Simmons in 1982. Ogata et al. introduced (v, u x c, 1)-splitting balanced incomplete block designs in 2006 in order to construct twofold optimal c-splitting authentication codes. In 2020, Paterson and Stinson showed that there exists an authentication code with perfect secrecy for u uniformly distributed source states that is epsilon-secure against message-substitution and key-substitution attacks if and only if there exists an epsilon-secure robust (2, 2)-threshold scheme for u uniformly distributed secrets, and they used an equitably ordered (v, u x c, 1)-splitting balanced incomplete block design (briefly a (v, u x c, 1)-ESBIBD) to construct a (1/cu)-secure robust (2, 2)-threshold scheme for u equiprobable secrets. Note that v equivalent to 1 (modu(u-1)c) and v(v-1) equivalent to 0 (modu(u-1)c(2)) if there is a (v, u x c, 1)-ESBIBD. In order to consider other orders v, we generalize the concept of a (v, u xc, 1)-ESBIBD to an equitably ordered (v, u xc, 1)-splitting packing design (briefly a (v, u x c, 1)-ESPD), which can also be used to construct a (1/cu)-secure robust (2, 2)-threshold scheme for u equiprobable secrets. In this paper, we study combinatorial constructions of (v, u x c, 1)-ESPDs and determine the existence of an optimal (v, u x c, 1)-ESPD for (u, c) is an element of {(2, k) : k is a positive integer} boolean OR{(3, 1), (4, 1), (3, 2)}. Consequently, we obtain some new infinite classes of authentication codes with perfect secrecy and (1/cu)-secure robust (2, 2)-threshold schemes.
引用
收藏
页码:2491 / 2515
页数:25
相关论文
共 50 条
  • [21] Constructions of authentication codes with hashing
    Zhang, J.Z.
    Xiao, G.Z.
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2001, 23 (06):
  • [22] Combinatorial Designs for Authentication and Secrecy Codes
    Huber, Michael
    FOUNDATIONS AND TRENDS IN COMMUNICATIONS AND INFORMATION THEORY, 2008, 5 (06): : 581 - +
  • [23] Three constructions of perfect authentication codes from projective geometry over finite fields
    Chen, Shangdi
    Zhang, Xiaolian
    APPLIED MATHEMATICS AND COMPUTATION, 2015, 253 : 308 - 317
  • [24] State Estimation Codes for Perfect Secrecy
    Tsiamis, Anastasios
    Gatsis, Konstantinos
    Pappas, George J.
    2017 IEEE 56TH ANNUAL CONFERENCE ON DECISION AND CONTROL (CDC), 2017,
  • [25] Robust Authentication and Data Storage with Perfect Secrecy
    Baur, Sebastian
    Boche, Holger
    2017 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2017, : 553 - 558
  • [26] Product Constructions for Perfect Lee Codes
    Etzion, Tuvi
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2011, 57 (11) : 7473 - 7481
  • [27] Linear authentication codes: Bounds and constructions
    Wang, HX
    Xing, CP
    Safavi-Naini, R
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2003, 49 (04) : 866 - 872
  • [28] SOME CONSTRUCTIONS AND BOUNDS FOR AUTHENTICATION CODES
    STINSON, DR
    LECTURE NOTES IN COMPUTER SCIENCE, 1987, 263 : 418 - 425
  • [29] Bounds and constructions for multireceiver authentication codes
    Safavi-Naini, R
    Wang, H
    ADVANCES IN CRYPTOLOGY - ASIACRYPT'98, 1998, 1514 : 242 - 256
  • [30] CONSTRUCTIONS FOR PERFECT MIXED CODES AND OTHER COVERING CODES
    ETZION, T
    GREENBERG, G
    IEEE TRANSACTIONS ON INFORMATION THEORY, 1993, 39 (01) : 209 - 214