Combinational constructions of splitting authentication codes with perfect secrecy

被引:0
|
作者
Ji, Lijun [1 ]
Liang, Miao [2 ]
Wang, Yanting [1 ]
机构
[1] Soochow Univ, Dept Math, Suzhou 215006, Peoples R China
[2] Suzhou Vocat Univ, Dept Math & Phys, Suzhou 215104, Peoples R China
关键词
Group divisible designs; Splitting packing designs; Splitting authentication codes; Robust (2,2)-threshold; DESIGNS;
D O I
10.1007/s10623-022-01092-6
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Splitting authentication codes were first introduced by Simmons in 1982. Ogata et al. introduced (v, u x c, 1)-splitting balanced incomplete block designs in 2006 in order to construct twofold optimal c-splitting authentication codes. In 2020, Paterson and Stinson showed that there exists an authentication code with perfect secrecy for u uniformly distributed source states that is epsilon-secure against message-substitution and key-substitution attacks if and only if there exists an epsilon-secure robust (2, 2)-threshold scheme for u uniformly distributed secrets, and they used an equitably ordered (v, u x c, 1)-splitting balanced incomplete block design (briefly a (v, u x c, 1)-ESBIBD) to construct a (1/cu)-secure robust (2, 2)-threshold scheme for u equiprobable secrets. Note that v equivalent to 1 (modu(u-1)c) and v(v-1) equivalent to 0 (modu(u-1)c(2)) if there is a (v, u x c, 1)-ESBIBD. In order to consider other orders v, we generalize the concept of a (v, u xc, 1)-ESBIBD to an equitably ordered (v, u xc, 1)-splitting packing design (briefly a (v, u x c, 1)-ESPD), which can also be used to construct a (1/cu)-secure robust (2, 2)-threshold scheme for u equiprobable secrets. In this paper, we study combinatorial constructions of (v, u x c, 1)-ESPDs and determine the existence of an optimal (v, u x c, 1)-ESPD for (u, c) is an element of {(2, k) : k is a positive integer} boolean OR{(3, 1), (4, 1), (3, 2)}. Consequently, we obtain some new infinite classes of authentication codes with perfect secrecy and (1/cu)-secure robust (2, 2)-threshold schemes.
引用
收藏
页码:2491 / 2515
页数:25
相关论文
共 50 条
  • [31] Some new classes of 2-fold optimal or perfect splitting authentication codes
    Miao Liang
    Lijun Ji
    Jingcai Zhang
    Cryptography and Communications, 2017, 9 : 407 - 430
  • [32] A new class of 2-fold perfect 4-splitting authentication codes
    Liang, Miao
    Jiang, Sufang
    Du, Beiliang
    ARS COMBINATORIA, 2016, 128 : 175 - 189
  • [33] A construction of t-fold perfect splitting authentication codes with equal deception probabilities
    Mingchao Li
    Miao Liang
    Beiliang Du
    Cryptography and Communications, 2015, 7 : 207 - 215
  • [34] A construction of t-fold perfect splitting authentication codes with equal deception probabilities
    Li, Mingchao
    Liang, Miao
    Du, Beiliang
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2015, 7 (02): : 207 - 215
  • [35] Some new classes of 2-fold optimal or perfect splitting authentication codes
    Liang, Miao
    Ji, Lijun
    Zhang, Jingcai
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2017, 9 (03): : 407 - 430
  • [36] A SUBLIMINAL CHANNEL IN CODES FOR AUTHENTICATION WITHOUT SECRECY
    SEBERRY, J
    ARS COMBINATORIA, 1985, 19A (MAY) : 37 - 41
  • [37] Almost perfect ciphers and authentication codes
    Zubov, A. U.
    PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2011, 14 (04): : 28 - 33
  • [38] Robust Secure Authentication and Data Storage with Perfect Secrecy
    Baur, Sebastian
    Boche, Holger
    CRYPTOGRAPHY, 2018, 2 (02) : 1 - 29
  • [39] LOWER BOUNDS FOR AUTHENTICATION CODES WITH SPLITTING
    SGARRO, A
    LECTURE NOTES IN COMPUTER SCIENCE, 1991, 473 : 283 - 293
  • [40] Two Constructions of Authentication Codes with Multiple Arbiters
    Chen, Shangdi
    Ma, Hao
    ARS COMBINATORIA, 2014, 116 : 321 - 330