Splitting authentication codes with perfect secrecy: new results, constructions and connections with algebraic manipulation detection codes

04/22/2021
by   Maura B. Paterson, et al.
0

A splitting BIBD is a type of combinatorial design that can be used to construct splitting authentication codes with good properties. In this paper we show that a design-theoretic approach is useful in the analysis of more general splitting authentication codes. Motivated by the study of algebraic manipulation detection (AMD) codes, we define the concept of a group generated splitting authentication code. We show that all group-generated authentication codes have perfect secrecy, which allows us to demonstrate that algebraic manipulation detection codes can be considered to be a special case of an authentication code with perfect secrecy. We also investigate splitting BIBDs that can be "equitably ordered". These splitting BIBDs yield authentication codes with splitting that also have perfect secrecy. We show that, while group generated BIBDs are inherently equitably ordered, the concept is applicable to more general splitting BIBDs. For various pairs (k,c), we determine necessary and sufficient (or almost sufficient) conditions for the existence of (v, k × c,1)-splitting BIBDs that can be equitably ordered. The pairs for which we can solve this problem are (k,c) = (3,2), (4,2), (3,3) and (3,4), as well as all cases with k = 2.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
10/09/2018

The existence of perfect codes in Doob graphs

We solve the problem of existence of perfect codes in the Doob graph. It...
research
06/13/2018

Additive perfect codes in Doob graphs

The Doob graph D(m,n) is the Cartesian product of m>0 copies of the Shri...
research
02/27/2019

Skew-constacyclic codes over F_q[v]/〈 v^q-v 〉

In this paper, the investigation on the algebraic structure of the ring ...
research
05/04/2019

On optimal weak algebraic manipulation detection codes and weighted external difference families

This paper provides a characterization of weak algebraic manipulation de...
research
09/17/2020

Coordinate transitivity of extended perfect codes and their SQS

We continue the study of the class of binary extended perfect propelinea...
research
04/06/2018

Quantum ciphertext authentication and key recycling with the trap code

We investigate quantum authentication schemes constructed from quantum e...
research
04/06/2018

Low Complexity Secure Code (LCSC) Design for Big Data in Cloud Storage Systems

In the era of big data, reducing the computational complexity of servers...

Please sign up or login with your details

Forgot password? Click here to reset