Skip to main content
Log in

A construction for t-fold perfect authentication codes with arbitration

  • Published:
Designs, Codes and Cryptography Aims and scope Submit manuscript

Abstract

Authentication codes with arbitration protect against deceptions from the transmitter and the receiver as well as that from the opponent. An authentication code with arbitration is t-fold perfect if the numbers of decoding rules and encoding rules meet the information-theoretic lower bounds. Pei (Message authentication codes (in Chinese). USCT, Hefei, 2009) pointed out that there has not yet been able to construct t-fold perfect authentication codes with arbitration for \(t > 2\). In this paper, we define a new design, perfect strong strict restricted partially balanced t-design, and prove that the existence of perfect strong strict restricted partially balanced t-designs implies the existence of t-fold perfect authentication codes with arbitration. Further, we obtain some new infinite classes of t-fold perfect authentication codes with arbitration.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  1. Bush K.A.: Orthogonal arrays of index unity. Ann. Math. Stat. 23, 293–295 (1952).

    Google Scholar 

  2. Chee Y.M., Zhang X., Zhang H.: Infinite families of optimal authentication codes secure against spoofing attacks of highter order. Adv. Math. Commun. 5, 59–68 (2011).

    Google Scholar 

  3. Colbourn C.J., Dinitz J.H.: The CRC Handbook of Combinatorial Design. Chapman Hall/CRC, Boca Raton (2007).

  4. Hanani H., Ray-Chaudhuri D.K., Wilson R.M.: On resolvable designs. Discret. Math. 3, 343–357 (1972).

    Google Scholar 

  5. Huber M.: Combinatorial bounds and characterizations of splitting authentication codes. Cryptogr. Commun. 2, 173–185 (2010).

    Google Scholar 

  6. Ji L., Yin J.: Constructions of new orthogonal arrays and covering arrays of strength three. J. Comb. Theory A 117, 23–33 (2010).

    Google Scholar 

  7. Johansson T.: Lower bounds on the probability of deception in authentication with arbitration. IEEE Trans. Inf. Theory 40, 1573–1585 (1994).

    Google Scholar 

  8. Liang M., Du B.: A new class of splitting 3-designs. Des. Codes Cryptogr. 60, 283–290 (2011).

    Google Scholar 

  9. Liang M., Du B.: A new class of 3-fold perfect splitting authentication codes. Des. Codes Cryptogr. 62, 109–119 (2012).

    Google Scholar 

  10. Mills W.H.: On the existence of H designs. Congr. Numer. 79, 129–141 (1990).

    Google Scholar 

  11. Pei D.: Information-theoretic bounds for authentication codes and block designs. J. Cryptol. 8, 177–188 (1995).

    Google Scholar 

  12. Pei D.: Authentication Codes and Combinatorial Designs. Chapman Hall/CRC, Boca Raton (2006).

  13. Pei D.: Message Authentication Codes (in Chinese). USCT, Hefei (2009).

  14. Pei D., Li Y., Wang Y., Safavi-Naini R.: Characterization of Authentication Codes with Arbitration. Lecture Notes in Computer Science, vol. 1587, pp. 303–313. Springer, New York (1999).

  15. Seiden E.: A method of construction of resolvable BIBD. Sankhya A 25, 393–394 (1963).

    Google Scholar 

  16. Simmons G.J.: A game theory model of digital message authentication. Congr. Numer. 34, 413–424 (1982).

    Google Scholar 

  17. Simmons G.J.: Message authentication with arbitration of transmitter/receiver disputes. In: Blakley G.R., Chaum D. (eds.) Advances in Cryptology-EUROCRYPT 1987. Lecture Notes in Computer Science, vol. 304, pp. 151–165. Springer, Berlin (1988).

Download references

Acknowledgments

This work was supported by the National Natural Science Foundation of China (Grant No. 11171248).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Beiliang Du.

Additional information

Communicated by C. J. Colbourn.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Liang, M., Li, M. & Du, B. A construction for t-fold perfect authentication codes with arbitration. Des. Codes Cryptogr. 73, 781–790 (2014). https://doi.org/10.1007/s10623-013-9826-3

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10623-013-9826-3

Keywords

Mathematics Subject Classification (2010)

Navigation