Combinatorial Characterizations of Authentication Codes II
نویسندگان
چکیده
For any authentication code for k source states and v messages having minimum possible deception probabilities (namely, P d 0 = k=v and P d 1 = (k ? 1)=(v ? 1)), we show that there must be at least v encoding rules. (This can be thought of as an authentication-code analogue of Fisher's Inequality .) We derive several properties that an extremal code must satisfy, and we characterize the extremal codes for equiprobable source states as arising from symmetric balanced incomplete block designs. We also present an inn-nite class of extremal codes, in which the source states are not equiprobable, derived from aane planes.
منابع مشابه
Combinatorial Characterizations of Authentication Codes
In this paper, we prove two new combinatorial characterizations of authentication codes. Authentication codes without secrecy are characterized in terms of orthogonal arrays; and general authentication codes are characterized in terms of balanced incomplete block designs.
متن کاملCombinatorial Designs for Authentication and Secrecy Codes
Combinatorial design theory is a very active area of mathematical research, with many applications in communications and information theory, computer science, statistics, engineering, and life sciences. As one of the fundamental discrete structures, combinatorial designs are used in fields as diverse as error-correcting codes, statistical design of experiments, cryptography and information secu...
متن کاملNew combinatorial bounds for authentication codesand key
This paper provides new combinatorial bounds and characterizations of authentication codes (A-codes) and key predistribution schemes (KPS). We rst prove a new lower bound on the number of keys in an A-code without secrecy, which can be thought of as a generalization of the classical Rao bound for orthogonal arrays. We also prove a new lower bound on the number of keys in a general A-code, which...
متن کاملCombinatorial characterizations of algebraic manipulation detection codes involving generalized difference families
This paper provides a mathematical analysis of optimal algebraic manipulation detection (AMD) codes. We prove several lower bounds on the success probability of an adversary and we then give some combinatorial characterizations of AMD codes that meet the bounds with equality. These characterizations involve various types of generalized difference families. Constructing these difference families...
متن کاملAuthentication codes from generalized quadrangles
Authentication codes were introduced by Simmons in [3]. Many combinatorial structures can be used to construct authentication codes, and interesting combinatorial bounds can be obtained, see e.g. [7], [8] and [9]. We investigate authentication codes arising from generalized quadrangles (GQs), which was first done in [1]. The use of intricated techniques and constructions from the theory of GQs ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Des. Codes Cryptography
دوره 7 شماره
صفحات -
تاریخ انتشار 1996