Abstract
Authentication codes with arbitration protect against deceptions from the transmitter and the receiver as well as that from the opponent. An authentication code with arbitration is t-fold perfect if the numbers of decoding rules and encoding rules meet the information-theoretic lower bounds. Pei (Message authentication codes (in Chinese). USCT, Hefei, 2009) pointed out that there has not yet been able to construct t-fold perfect authentication codes with arbitration for \(t > 2\). In this paper, we define a new design, perfect strong strict restricted partially balanced t-design, and prove that the existence of perfect strong strict restricted partially balanced t-designs implies the existence of t-fold perfect authentication codes with arbitration. Further, we obtain some new infinite classes of t-fold perfect authentication codes with arbitration.
Similar content being viewed by others
References
Bush K.A.: Orthogonal arrays of index unity. Ann. Math. Stat. 23, 293–295 (1952).
Chee Y.M., Zhang X., Zhang H.: Infinite families of optimal authentication codes secure against spoofing attacks of highter order. Adv. Math. Commun. 5, 59–68 (2011).
Colbourn C.J., Dinitz J.H.: The CRC Handbook of Combinatorial Design. Chapman Hall/CRC, Boca Raton (2007).
Hanani H., Ray-Chaudhuri D.K., Wilson R.M.: On resolvable designs. Discret. Math. 3, 343–357 (1972).
Huber M.: Combinatorial bounds and characterizations of splitting authentication codes. Cryptogr. Commun. 2, 173–185 (2010).
Ji L., Yin J.: Constructions of new orthogonal arrays and covering arrays of strength three. J. Comb. Theory A 117, 23–33 (2010).
Johansson T.: Lower bounds on the probability of deception in authentication with arbitration. IEEE Trans. Inf. Theory 40, 1573–1585 (1994).
Liang M., Du B.: A new class of splitting 3-designs. Des. Codes Cryptogr. 60, 283–290 (2011).
Liang M., Du B.: A new class of 3-fold perfect splitting authentication codes. Des. Codes Cryptogr. 62, 109–119 (2012).
Mills W.H.: On the existence of H designs. Congr. Numer. 79, 129–141 (1990).
Pei D.: Information-theoretic bounds for authentication codes and block designs. J. Cryptol. 8, 177–188 (1995).
Pei D.: Authentication Codes and Combinatorial Designs. Chapman Hall/CRC, Boca Raton (2006).
Pei D.: Message Authentication Codes (in Chinese). USCT, Hefei (2009).
Pei D., Li Y., Wang Y., Safavi-Naini R.: Characterization of Authentication Codes with Arbitration. Lecture Notes in Computer Science, vol. 1587, pp. 303–313. Springer, New York (1999).
Seiden E.: A method of construction of resolvable BIBD. Sankhya A 25, 393–394 (1963).
Simmons G.J.: A game theory model of digital message authentication. Congr. Numer. 34, 413–424 (1982).
Simmons G.J.: Message authentication with arbitration of transmitter/receiver disputes. In: Blakley G.R., Chaum D. (eds.) Advances in Cryptology-EUROCRYPT 1987. Lecture Notes in Computer Science, vol. 304, pp. 151–165. Springer, Berlin (1988).
Acknowledgments
This work was supported by the National Natural Science Foundation of China (Grant No. 11171248).
Author information
Authors and Affiliations
Corresponding author
Additional information
Communicated by C. J. Colbourn.
Rights and permissions
About this article
Cite this article
Liang, M., Li, M. & Du, B. A construction for t-fold perfect authentication codes with arbitration. Des. Codes Cryptogr. 73, 781–790 (2014). https://doi.org/10.1007/s10623-013-9826-3
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10623-013-9826-3
Keywords
- t-Fold perfect authentication code with arbitration
- Perfect strong strict restricted partially balanced t-design