New combinatorial designs and their applications to authentication codes and secret sharing schemes

نویسندگان

  • Wakaha Ogata
  • Kaoru Kurosawa
  • Douglas R. Stinson
  • Hajime Saido
چکیده

This paper introduces three new types of combinatorial designs, which we call external difference families (EDF), external BIBDs (EBIBD) and splitting BIBDs. An EDF is a special type of EBIBD, so existence of an EDF implies existence of an EBIBD. We construct optimal splitting A-codes by using EDF. Then we give a new bound on the number of shares required in robust secret sharing schemes (i.e., schemes secure against cheaters). EDF can be used to construct robust secret sharing schemes that are optimal with respect to the new bound. We also prove a weak converse, showing that if there exists an optimal secret sharing scheme, then there exists an EBIBD. Finally, we derive a Fisher-type inequality for splitting BIBDs. We also prove a weak equivalence between splitting BIBDs and splitting A-codes. Further, it is shown that an EDF implies a splitting BIBD.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Some connections between self-dual codes, combinatorial designs and secret sharing schemes

Some connections between self-dual codes, combinatorial designs and secret-sharing schemes Stefka Bouyuklieva, Zlatko Varbanov Department of Mathematics and Informatics, University of Veliko Tarnovo, Bulgaria In the present work we study a class of singly even self-dual codes with the special property that the minimum weight of their shadow is 1. Some of these codes support 1 and 2-designs. Usi...

متن کامل

Abstracts for talks to be presented in the CCCS 98 Workshop Instructional

s for talks to be presented in the CCCS 98 Workshop Instructional Lectures Cryptography and Combinatorial Designs Charles J. Colbourn, Dorothean Professor of Computer Science University of Vermont In this series of five lectures, we explore some of the many problems in cryptography where combinatorial designs have played a substantial role. To set the stage, we review some ideas from classical ...

متن کامل

Some Applications of Bounds for Designs to the Cryptography

Recent years have seen numerous examples when designs play an important role in the study of such topics in cryptography as secrecy and authentication codes, secret sharing schemes, correlation-immune and resilient functions. In this paper we give applications of some methods and results from the design theory, especially bounding the optimal size of the designs and codes, to cryptography. We g...

متن کامل

A new class of three-weight linear codes from weakly regular plateaued functions

Linear codes with few weights have many applications in secret sharing schemes, authentication codes, communication and strongly regular graphs. In this paper, we consider linear codes with three weights in arbitrary characteristic. To do this, we generalize the recent contribution of Mesnager given in [Cryptography and Communications 9(1), 71-84, 2017]. We first present a new class of binary l...

متن کامل

A class of q-ary linear codes derived from irreducible cyclic codes

Recently, linear codes with a few weights were widely investigated due to their applications in secret sharing schemes and authentication schemes. In this letter, we present a class of q-ary linear codes derived from irreducible cyclic codes with q a prime power. We use Gauss sums to represent its Hamming weights and obtain the bounds of its minimum Hamming distance. In some cases, we explicitl...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Discrete Mathematics

دوره 279  شماره 

صفحات  -

تاریخ انتشار 2004