Two Constructions of Optimal Cartesian Authentication Codes from Unitary Geometry over Finite Fields

被引:10
作者
Chen, Shang-di [1 ]
Zhao, Da-wei [2 ]
机构
[1] Civil Aviat Univ China, Coll Sci, Tianjin 300300, Peoples R China
[2] Beijing Univ Posts & Telecommun, Informat Secur Ctr, Beijing 100876, Peoples R China
来源
ACTA MATHEMATICAE APPLICATAE SINICA-ENGLISH SERIES | 2013年 / 29卷 / 04期
基金
中国国家自然科学基金;
关键词
unitary geometry; optimal authentication code; finite field; ARBITRATION;
D O I
10.1007/s10255-013-0259-6
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Two constructions of cartesian authentication codes from unitary geometry are given in this paper. Their size parameters and their probabilities of successful impersonation attack and successful substitution attack are computed. They are optimal under some cases.
引用
收藏
页码:829 / 836
页数:8
相关论文
共 13 条
  • [1] Chen S.D., 2010, ARS COMBINATORIA, V99, P193
  • [2] Chen SD, 2010, ARS COMBINATORIA, V97A, P453
  • [3] Feng R.Q., 1999, NE MATH J, V15, P103
  • [4] Authentication codes and bipartite graphs
    Feng, Rongquan
    Hu, Lei
    Kwak, Jin Ho
    [J]. EUROPEAN JOURNAL OF COMBINATORICS, 2008, 29 (06) : 1473 - 1482
  • [5] Gao Y., 1995, APPL MATH, V10, P345, DOI [10.1007/BF02662876, DOI 10.1007/BF02662876]
  • [6] CODES WHICH DETECT DECEPTION
    GILBERT, EN
    MACWILLIAMS, FJ
    SLOANE, NJA
    [J]. BELL SYSTEM TECHNICAL JOURNAL, 1974, 53 (03): : 405 - 424
  • [7] CONSTRUCTION OF CARTESIAN AUTHENTICATION CODE FROM ORTHOGONAL SPACES OVER A FINITE FIELD OF ODD CHARACTERISTIC
    Li, Zengti
    Gao, Suogang
    Wang, Zhong
    Thuraisingham, Bhavani
    Wu, Weili
    [J]. DISCRETE MATHEMATICS ALGORITHMS AND APPLICATIONS, 2009, 1 (01) : 105 - 114
  • [8] Simmons G., 1985, Authentication Theory/Coding Theory, P411, DOI DOI 10.1007/3-540-39568-7_32
  • [9] SIMMONS GJ, 1988, LECT NOTES COMPUT SC, V304, P151
  • [10] Stinson D. R., 1990, Journal of Cryptology, V2, P23, DOI 10.1007/BF02252868