A New Construction of Multi-sender Authentication Codes from Polynomials over Finite Fields

نویسنده

  • Xiuli Wang
چکیده

Multisender authentication code was firstly constructed by Gilbert et al. [1] in 1974. Multisender authentication system refers towho a groupof senders, cooperatively send amessage to a receiver; then the receiver should be able to ascertain that the message is authentic. About this case, many scholars and researchers had made great contributions to multisender authentication codes, such as [2–6]. In the actual computer network communications, multisender authentication codes include sequential model and simultaneous model. Sequential model is that each sender uses his own encoding rules to encode a source state orderly, the last sender sends the encoded message to the receiver, and the receiver receives themessage and verifies whether the message is legal or not. Simultaneousmodel is that all senders use their own encoding rules to encode a source state, and each sender sends the encoded message to the synthesizer, respectively; then the synthesizer forms an authenticated message and verifies whether the message is legal or not. In this paper, we will adopt the second model. In a simultaneous model, there are four participants: a group of senders U = {U 1 , U 2 , . . . , U n }, the key distribution center, he is responsible for the key distribution to senders and receiver, including solving the disputes between them, a receiver R, and a synthesizer, where he only runs the trusted synthesis algorithm. The code works as follows: each sender and receiver has their own Cartesian authentication code, respectively. Let (S, E i , T i ; f i ) (i = 1, 2, . . . , n) be the senders’ Cartesian authentication code, (S, E R , T; g) be the receiver’s Cartesian authentication code, h : T 1 × T 2 × ⋅ ⋅ ⋅ × T n →

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A New Construction of Multi-receiver Authentication Codes from Pseudo-Symplectic Geometry over Finite Fields

Multi-receiver authentication codes allow one sender to construct an authenticated message for a group of receivers such that each receiver can verify authenticity of the received message. In this paper, we constructed one multi-receiver authentication codes from pseudo-symplectic geometry over finite fields. The parameters and the probabilities of deceptions of this codes are also computed.

متن کامل

Two Constructions of Multireceiver Authentication Codes from Singular Symplectic Geometry over Finite Fields

Multireceiver authentication codes allow one sender to construct an authenticated message for a group of receivers such that each receiver can verify authenticity of the received message. In this paper, two constructions of multireceiver authentication codes from singular symplectic geometry over finite fields are given. The parameters and the probabilities of success for different types of dec...

متن کامل

New Construction of Authentication Codes with Arbitration from Pseudo-Symplectic Geometry over Finite Fields

A new construction of authentication codes with arbitration from pseudo-symplectic geometry over finite fields is given. The parameters and the probabilities of deceptions of the codes are also computed. §

متن کامل

A Construction of Multi-sender Authentication Codes from Pseudo-Symplectic Geometry over Finite Fields

Multisender authentication code was firstly constructed by Gilbert et al. in [1] in 1974.Multisender authentication system refers to a group of senders that cooperatively send amessage to the receiver, and then the receiver should be able to ascertain that the message is authentic. About this case, many scholars had also much researches and had made great contributions to multisender authentica...

متن کامل

A Generic Construction of Homomorphic MAC for Multi-File Transmission in Network Coding

—Homomorphic message authentication codes (MAC) have been proposed to thwart pollution attacks in network coding. The existing schemes mainly are based on the vector inner product or trace function over finite fields. Recently, Wang and Hu presented a generic construction of homomorphic MAC scheme based on linear mapping over finite fields which is an excellent abstract of the vector inner pro...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • J. Applied Mathematics

دوره 2013  شماره 

صفحات  -

تاریخ انتشار 2013