Authentication codes based on resilient Boolean maps
نویسندگان
چکیده
We introduce new constructions of systematic authentication codes over finite fields and Galois rings. One code is built over finite fields using resilient functions and it provides optimal impersonation and substitution probabilities. Other two proposed codes are defined over Galois rings, one is based on resilient maps and it attains optimal probabilities as well, while the other uses maps whose Fourier transforms get higher values. Being the finite fields special cases of Galois rings, the first code introduced for Galois rings apply also at finite fields. For the special case of characteristic p, the maps used at the second case in Galois rings are bent indeed, and this case is subsumed by our current general construction of characteristic p, with s ≥ 2.
منابع مشابه
Secret Sharing Schemes Based on Resilient Boolean Maps
We introduce a linear code based on resilient maps on vector spaces over finite fields, we give a basis of this code and upper and lower bounds for its minimal distance. Then the use of the introduced code for building vector space secret sharing schemes is explained and an estimation of the robustness of the schemes against cheaters is provided.
متن کاملFurther Constructions of Almost Resilient Functions
Almost resilient function is the generalization of resilient function and have important applications in multiple authenticate codes and almost security cryptographic Boolean functions.In this paper,some secondary constructions are provided.In particular, the theorem 3 in [6] is improved. As ε-almost(n, 1, k)-CI functions plays an important role in the secondary constructions, we concluded some...
متن کاملVectorial Resilient $PC(l)$ of Order $k$ Boolean Functions from AG-Codes
Propagation criteria and resiliency of vectorial Boolean functions are important for cryptographic purpose (see [1], [2], [3], [4], [7], [8], [10], [11] and [16]). Kurosawa , Stoh [8] and Carlet [1] gave a construction of Boolean functions satisfying PC(l) of order k from binary linear or nonlinear codes. In this paper algebraic-geometric codes over GF (2m) are used to modify the Carlet and Kur...
متن کاملError-resilient Dna Computation Ecole Normale Supérieure De Lyon Error-resilient Dna Computation Error-resilient Dna Computation
The DNA model of computation with test tubes of DNA molecules encoding bit sequences is based on three primitives Extract A Bit Merge Two Tubes and Detect Emptiness Perfect operations can test the satis ability of any boolean formula in linear time However in re ality the Extract operation is faulty We determine the minimum num ber of faulty Extract operations required to simulate a single high...
متن کاملSearching Extrema on the Regular Graph of Balanced Boolean Maps
The class of Boolean functions has a structure of a Boolean algebra and a -dimensional vector space over the prime field of characteristic two. Here we consider the graph whose nodes are the balanced Boolean functions and whose edges are pairs of maps with sum a balanced map. This is a regular graph with degree ` ́ . Within this graph it is posed the problem to find extreme values of the non li...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Des. Codes Cryptography
دوره 80 شماره
صفحات -
تاریخ انتشار 2016