The strong partially balanced t-designs can be used to construct authentication codes, whose probabilities Pr of successful deception in an optimum spoofing attack of order r for r = 0, 1, . . . , t -1, achieve their information-theoretic lower bounds. In this paper a new family of strong partially
Combinatorial characterizations of authentication codes
โ Scribed by D. R. Stinson
- Publisher
- Springer
- Year
- 1992
- Tongue
- English
- Weight
- 536 KB
- Volume
- 2
- Category
- Article
- ISSN
- 0925-1022
No coin nor oath required. For personal study only.
โฆ Synopsis
In this paper, we prove two new combinatorial characterizations of authentication codes. Authentication codes without secrecy are characterized in terms of orthogonal arrays; and general authentication codes are characterized in terms of balanced incomplete block designs. In both of these characterizations, it turns out that encoding roles must be equiprobable; in the second characteriztion, the source states must also be equiprobable.
๐ SIMILAR VOLUMES
This paper introduces three new types of combinatorial designs, which we call external difference families (EDF), external BIBDs (EBIBD) and splitting BIBDs. An EDF is a special type of EBIBD, so existence of an EDF implies existence of an EBIBD. We construct optimal splitting A-codes by using EDF.
In the present paper several constructions of Cartesian authentication codes from unitary geometry over finite fields are presented and their size parameters are computed. Assuming that the encoding rules are chosen according to a uniform probability distribution, the probabilities Pt and Ps of a su