Combinatorial Classiication of Optimal Authentication Codes with Arbitration Satoshi Obana and Kaoru Kurosawa
نویسندگان
چکیده
Unconditionally secure authentication codes with arbitration (A 2-codes) protect against deceptions from the transmitter and the receiver as well as that from the opponent. We rst show that an optimal A 2-code implies an orthogonal array and an aane-resolvable design. Next we deene a new design, an aane-resolvable + BIBD, and prove that optimal A 2-codes are equivalent to this new design. From this equivalence, we derive a condition on the parameters for the existence of optimal A 2-codes. Further, we show tighter lower bounds on the size of keys than before for large sizes of source states which can be considered as an extension of the bounds on the related designs.
منابع مشابه
Combinatorial Bounds on Authentication Codes with Arbitration
Unconditionally secure authentication codes with arbitration (A 2-codes) protect against deceptions from the transmitter and the receiver as well as that from the opponent. In this paper, we present combinatorial lower bounds on the cheating probabilities and the sizes of keys of A 2-codes. Especially, our bounds for A 2-codes without secrecy are all tight for small size of source states.
متن کاملCombinatorial Bounds for Authentication Codes with Arbitration
Unconditionally secure authentication codes with arbitration (A 2 -codes) protect against deceptions from the transmitter and the receiver as well as that from the opponent. In this paper, we present combinatorial lower bounds on the cheating probabilities for A 2 -codes in terms of the number of source states, that of the whole messages and that of messages which the receiver accepts as authen...
متن کاملCharacterisation of (k, n) Multi-receiver Authentication
In the model of (k; n) multi-receiver authentication codes there are n receivers. An opponent and any k 1 receivers cannot cheat any other receiver. Here we show tight lower bounds on the size of messages and the size of keys for given cheating probabilities. We also show a necessary and su cient condition for the optimum scheme, which is given by a combinatorial characterization between the tr...
متن کاملBounds of Authentication Codeswith
Unconditionally secure authentication codes with arbitration (A 2-codes) protect against deceptions from the transmitter and the receiver as well as that from the opponent. In this paper, we present combinatorial lower bounds on the cheating probabilities and the sizes of keys of A 2-codes. Especially, our bounds for A 2-codes without secrecy are all tight for small size of source states. Our m...
متن کاملBounds and Combinatorial Structure of (k; N) Multi-receiver A-codes
In the model of (k; n) multi-receiver authentication codes (A-codes), a transmitter broadcasts a message m to n receivers in such a way that not only an outside opponent but also any k ? 1 receivers cannot cheat any other receiver. In this paper, we derive lower bounds on the cheating probabilities and the sizes of keys of (k; n) multi-receiver A-codes. The scheme proposed by Desmedt, Frankel a...
متن کامل