Skip to main content

Characterization of (k, n) multi-receiver authentication

  • Authentication Codes And Secret Sharing Schemes
  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1270))

Abstract

In the model of (k,n) multi-receiver authentication codes there are n receivers. An opponent and any k — 1 receivers cannot cheat any other receiver. Here we show tight lower bounds on the size of messages and the size of keys for given cheating probabilities. We also show a necessary and sufficient condition for the optimum scheme, which is given by a combinatorial characterization between the transmitter's keys and the keys of each receiver.

This is a preview of subscription content, log in via an institution.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. G. J. Simmons: A survey of Information Authentication, Contemporary Cryptology, The science of information integrity, ed. G. J. Simmons, IEEE Press, New York, (1992)

    Google Scholar 

  2. G. J. Simmons: Authentication theory/coding theory, Proc. Crypto '84, Lecture Notes in Computer Science 196, Springer Verlag (1985) 411–431

    Google Scholar 

  3. E. F. Brickell: A few results in message authentication, Congresus Numerantium, vol. 43 (1984) 141–154

    Google Scholar 

  4. G. J. Simmons: Message authentication: a game on hypergraphs, Congr. Number. 45 (1984) 161–192

    Google Scholar 

  5. J. L. Massey: Cryptography — a selective survey, Digital Communications, North Holland (pub.) (1986) 3–21

    Google Scholar 

  6. D. R. Stinson: Some constructions and bounds for authentication codes, Journal of Cryptology 1 (1988) 37–51

    Article  Google Scholar 

  7. D. R. Stinson: The combinatorics of authentication and secrecy codes, Journal of Cryptology, Vol. 2, no 1 (1990) 23–49

    Google Scholar 

  8. D.R. Stinson: Combinatorial Characterization of Authentication Codes, Proc. Crypto'91, Lecture Notes in Computer Science 576, Springer Verlag (1992) 62–72

    Google Scholar 

  9. Marijke De Soete: New Bounds and Constructions for Authentication/Secrecy Codes with Splitting, Journal of Cryptology, Vol. 3, no 3 (1991) 173–186

    Article  Google Scholar 

  10. Y. Desmedt, Y. Frankel and M. Yung: Multi-receiver/Multi-sender network security: efficient authenticated multicast/feedback, IEEE Infocom'92, (1992) 2045–2054

    Google Scholar 

  11. S. Raghavarao: Constructions and combinatorial problems in design of experiments, John Wiley & Sons, Inc. (1971).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Vijay Varadharajan Josef Pieprzyk Yi Mu

Rights and permissions

Reprints and permissions

Copyright information

© 1997 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kurosawa, K., Obana, S. (1997). Characterization of (k, n) multi-receiver authentication. In: Varadharajan, V., Pieprzyk, J., Mu, Y. (eds) Information Security and Privacy. ACISP 1997. Lecture Notes in Computer Science, vol 1270. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0027927

Download citation

  • DOI: https://doi.org/10.1007/BFb0027927

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-63232-0

  • Online ISBN: 978-3-540-69237-9

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics