A Construction of Multi-sender Authentication Codes from Pseudo-Symplectic Geometry over Finite Fields

نویسنده

  • Xiuli Wang
چکیده

Multisender authentication code was firstly constructed by Gilbert et al. in [1] in 1974.Multisender authentication system refers to a group of senders that cooperatively send amessage to the receiver, and then the receiver should be able to ascertain that the message is authentic. About this case, many scholars had also much researches and had made great contributions to multisender authentication codes [2–6]. In the actual computer network communications, multisender authentication codes include sequential model and simultaneous model. Sequential model is that each sender uses its own encoding message to the receiver, and the receiver receives the message and verifies whether the message is legal or not. Simultaneous model is that all senders use their own encoding rules to encode a source state, and each sender sends the encoded message to the synthesizer, respectively, and then the synthesizer forms an authenticated message and verifies whether the message is legal or not. In this paper, we will adopt the second model. In a simultaneous model, there are four participants: a group of senders P = {P 1 , P 2 , . . . , P n }, the keys distribution center, he is responsible for the key distribution to senders and receiver, including solving the disputes between them, a receiver R, a synthesizer, he only runs the trusted synthesis algorithm. The code works as follows: each sender and receiver has their own cartesian authentication code, respectively. Let (S, E i , T i ; f i ) (i = 1, 2, . . . , n) be the senders’ cartesian authentication code, (S, E R , T; g) be the receiver’s cartesian authentication code, h : T 1 × T 2 × ⋅ ⋅ ⋅ × T n → T

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A New Construction of Multi-receiver Authentication Codes from Pseudo-Symplectic Geometry over Finite Fields

Multi-receiver authentication codes allow one sender to construct an authenticated message for a group of receivers such that each receiver can verify authenticity of the received message. In this paper, we constructed one multi-receiver authentication codes from pseudo-symplectic geometry over finite fields. The parameters and the probabilities of deceptions of this codes are also computed.

متن کامل

New Construction of Authentication Codes with Arbitration from Pseudo-Symplectic Geometry over Finite Fields

A new construction of authentication codes with arbitration from pseudo-symplectic geometry over finite fields is given. The parameters and the probabilities of deceptions of the codes are also computed. §

متن کامل

Two Constructions of Multireceiver Authentication Codes from Singular Symplectic Geometry over Finite Fields

Multireceiver authentication codes allow one sender to construct an authenticated message for a group of receivers such that each receiver can verify authenticity of the received message. In this paper, two constructions of multireceiver authentication codes from singular symplectic geometry over finite fields are given. The parameters and the probabilities of success for different types of dec...

متن کامل

The Construction of A-code from Singular Pseudo-symplectic Geometry over Finite Fields

A construction of A3-code from singular pseudo-symplectic geometry over finite fields is presented. Under the assumption that the encoding rules of the transmitter, the receiver and the arbiter are chosen according to a uniform probability distribution, the parameters and the probabilities of success for different types of deceptions are computed. Key–Words: A3-codes, Singular Pseudo-symplectic...

متن کامل

A New Construction of Multi-sender Authentication Codes from Polynomials over Finite Fields

Multisender authentication code was firstly constructed by Gilbert et al. [1] in 1974. Multisender authentication system refers towho a groupof senders, cooperatively send amessage to a receiver; then the receiver should be able to ascertain that the message is authentic. About this case, many scholars and researchers had made great contributions to multisender authentication codes, such as [2–...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Ars Comb.

دوره 106  شماره 

صفحات  -

تاریخ انتشار 2012