Multi-receiver Authentication Scheme for Multiple Messages Based on Linear Codes
نویسندگان
چکیده
In this paper, we construct an authentication scheme for multi-receivers and multiple messages based on a linear code C. This construction can be regarded as a generalization of the authentication scheme given by Safavi-Naini and Wang [8]. Actually, we notice that the scheme of Safavi-Naini and Wang is constructed with Reed-Solomon codes. The generalization to linear codes has the similar advantages as generalizing Shamir’s secret sharing scheme to linear secret sharing sceme based on linear codes [1, 6, 5, 7, 9]. For a fixed message base field Fq, our scheme allows arbitrarily many receivers to check the integrity of their own messages, while the scheme of Safavi-Naini and Wang has a constraint on the number of verifying receivers V 6 q. And we introduce access structure in our scheme. Massey [5] characterized the access structure of linear secret sharing scheme by minimal codewords in the dual code whose first component is 1. We slightly modify the definition of minimal codewords in [5]. Let C be a [V, k] linear code. For any coordinate i ∈ {1, 2, · · · ,V}, a codeword ~c in C is called minimal respect to i if the codeword ~c has component 1 at the i-th coordinate and there is no other codeword whose i-th component is 1 with support strictly contained in that of ~c. Then the security of receiver Ri in our authentication scheme is characterized by the minimal codewords respect to i in the dual code C . Authentication scheme, linear codes, secret sharing, minimal codewords, substitution attack.
منابع مشابه
An Authentication Scheme for Subspace Codes over Network Based on Linear Codes
Network coding provides the advantage of maximizing the usage of network resources, and has great application prospects in future network communications. However, the properties of network coding also make the pollution attack more serious. In this paper, we give an unconditional secure authentication scheme for network coding based on a linear code C. Safavi-Naini and Wang [1] gave an authenti...
متن کاملCharacterisation of (k, n) Multi-receiver Authentication
In the model of (k; n) multi-receiver authentication codes there are n receivers. An opponent and any k 1 receivers cannot cheat any other receiver. Here we show tight lower bounds on the size of messages and the size of keys for given cheating probabilities. We also show a necessary and su cient condition for the optimum scheme, which is given by a combinatorial characterization between the tr...
متن کاملNew Results on Multi-Receiver Authentication Codes
Multi-receiver authentication is an extension of traditional point-to-point message authentication in which a sender broadcasts a single authenticated message such that all the receivers can independently verify the authenticity of the message, and malicious groups of up to a given size of receivers can not successfully impersonate the transmitter, or substitute a transmitted message. This pape...
متن کاملA TWOOA construction for multi-receiver multi-message authentication codes
A (k, n;w) multi-receiver multi-message authentication code allows a transmitter to broadcast up to w − 1 different authenticated messages to n receivers in such a way that (1) not only an opponent but also any up to k − 1 receivers cannot cheat any other receivers, and (2) all the receivers can independently verify the authenticity of the messages. Obana and Kurosawa (Designs, Codes and Crypto...
متن کاملAn ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure
Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication. This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...
متن کامل