Authentication codes based on resilient Boolean maps

نویسندگان

  • Juan Carlos Ku-Cauich
  • Guillermo Morales-Luna
چکیده

We introduce new constructions of systematic authentication codes over finite fields and Galois rings. One code is built over finite fields using resilient functions and it provides optimal impersonation and substitution probabilities. Other two proposed codes are defined over Galois rings, one is based on resilient maps and it attains optimal probabilities as well, while the other uses maps whose Fourier transforms get higher values. Being the finite fields special cases of Galois rings, the first code introduced for Galois rings apply also at finite fields. For the special case of characteristic p, the maps used at the second case in Galois rings are bent indeed, and this case is subsumed by our current general construction of characteristic p, with s ≥ 2.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secret Sharing Schemes Based on Resilient Boolean Maps

We introduce a linear code based on resilient maps on vector spaces over finite fields, we give a basis of this code and upper and lower bounds for its minimal distance. Then the use of the introduced code for building vector space secret sharing schemes is explained and an estimation of the robustness of the schemes against cheaters is provided.

متن کامل

Further Constructions of Almost Resilient Functions

Almost resilient function is the generalization of resilient function and have important applications in multiple authenticate codes and almost security cryptographic Boolean functions.In this paper,some secondary constructions are provided.In particular, the theorem 3 in [6] is improved. As ε-almost(n, 1, k)-CI functions plays an important role in the secondary constructions, we concluded some...

متن کامل

Vectorial Resilient $PC(l)$ of Order $k$ Boolean Functions from AG-Codes

Propagation criteria and resiliency of vectorial Boolean functions are important for cryptographic purpose (see [1], [2], [3], [4], [7], [8], [10], [11] and [16]). Kurosawa , Stoh [8] and Carlet [1] gave a construction of Boolean functions satisfying PC(l) of order k from binary linear or nonlinear codes. In this paper algebraic-geometric codes over GF (2m) are used to modify the Carlet and Kur...

متن کامل

Error-resilient Dna Computation Ecole Normale Supérieure De Lyon Error-resilient Dna Computation Error-resilient Dna Computation

The DNA model of computation with test tubes of DNA molecules encoding bit sequences is based on three primitives Extract A Bit Merge Two Tubes and Detect Emptiness Perfect operations can test the satis ability of any boolean formula in linear time However in re ality the Extract operation is faulty We determine the minimum num ber of faulty Extract operations required to simulate a single high...

متن کامل

Searching Extrema on the Regular Graph of Balanced Boolean Maps

The class of Boolean functions has a structure of a Boolean algebra and a -dimensional vector space over the prime field of characteristic two. Here we consider the graph whose nodes are the balanced Boolean functions and whose edges are pairs of maps with sum a balanced map. This is a regular graph with degree ` ́ . Within this graph it is posed the problem to find extreme values of the non li...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Des. Codes Cryptography

دوره 80  شماره 

صفحات  -

تاریخ انتشار 2016