Skip to main content
Log in

Linear Sections of the Finite Veronese Varieties and Authentication Systems Defined Using Geometry

  • Published:
Designs, Codes and Cryptography Aims and scope Submit manuscript

Abstract

In this paper we deal with authentication systems in which one key is used to authenticate many source states. We answer a related question on the cardinalities of the intersections of quadrics in PG (d,q). We first generalize a class of geometric authentication systems, which has been introduced by Beutelspacher, Tallini and Zanella4. The source states are the lines through a special point N of PG (d,q) (the d-dimensional projective space over GF (q)). The keys are some hypersurfaces which have N as a nucleus ( N is a nucleus of Σ if every line through N meets Σ in exactly one point). The message belonging to a source state ℓ and a key Σ is the unique point of intersection of the line ℓ with the hypersurface Σ. We give the values of s for which the constructed authentication systems have a security which is comparable to the best allowed by a theoretical bound. In case the hypersurfaces are quadrics, we give further results on the security. To this end, we determine the greatest cardinality for the intersections of the finite Veronese varieties with the projective subspaces of any given dimension. Finally, we discuss a possible implementation.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. H. Beker and F.C. Piper, Cipher systems, Northwood Books, London (1982).

    Google Scholar 

  2. A. Beutelspacher and U. Rosenbaum, Geometric authentication systems, Ratio Math., Vol. 1 (1990) pp. 39-50.

    Google Scholar 

  3. A. Beutelspacher and U. Rosenbaum, Essentially ℓ-fold secure authentication systems, EUROCRYPT' 90, Lecture Notes in Computer Science, Vol. 473, Springer-Verlag, Berlin (1991) pp. 294-305.

    Google Scholar 

  4. A. Beutelspacher, G. Tallini and C. Zanella, Examples of essentially s-fold secure geometric authentication systems with large s, Rend. Mat. Appl., Vol. 7, No.10 (1990) pp. 321-326.

    Google Scholar 

  5. M. De Soete, K. Vedder and M. Walker, Cartesian authentication schemes, Advances in cryptology - EUROCRYPT' 89, Lecture Notes in Comput. Sci. Vol. 434 (1990) pp. 476-490.

    Google Scholar 

  6. V. Fåk, Repeated use of codes which detect deception, IEEE Trans. Inform. TheoryVol. IT-25 (1979) pp. 233-234.

    Google Scholar 

  7. E.N. Gilbert, F.J. MacWilliams and N.J.A. Sloane, Codes which detect deception, Bell. Syst. Techn. J.Vol. 53 (1974) pp. 405-424.

    Google Scholar 

  8. J.W.P. Hirschfeld and J.A. Thas, General Galois geometries, Oxford University Press, Oxford (1991).

    Google Scholar 

  9. U. Rosenbaum, Beweisbar sichere Authentikationssysteme, Ph. D. dissertation, 1992.

  10. U. Rosenbaum, Alower bound on authentication after having observed a sequence of messages, J. CryptologyVol. 6 (1993) pp. 135-156.

    Google Scholar 

  11. B. Segre, Le geometrie di Galois, Ann. Mat. Pura Appl., Vol. 48 (1959) pp. 1-97.

    Google Scholar 

  12. A. Sgarro, Information-theoretic bounds for authentication frauds, J. of Computer SecurityVol. 2 (1993) pp. 53-63.

    Google Scholar 

  13. G. Tallini, Le ipersuperficie irriducibili d'ordine minimo che invadono uno spazio di Galois, Atti Accad. Naz. Lincei Rend. Cl. Sci. Fis. Mat. Nat.Vol. 8, No.30 (1961) pp. 706-712.

    Google Scholar 

  14. M. Walker, Information-theoretic bounds for authentication schemes, J. Cryptology, Vol.2 (1990) pp. 131- 143.

  15. C. Zanella, Authenticating by using nuclei of hypersurfaces in PG(d, q), Preprint Univ. Udine UDMI/01/92/RT, 1992.

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Zanella, C. Linear Sections of the Finite Veronese Varieties and Authentication Systems Defined Using Geometry. Designs, Codes and Cryptography 13, 199–212 (1998). https://doi.org/10.1023/A:1008286614783

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1023/A:1008286614783

Navigation