Abstract
In a common authentication code with arbitration, the dishonest arbiter may make a threat to the security of authentication system. In this paper, an authentication code with double arbiters over symplectic geometry is constructed, and the relevant parameters and the probabilities of successful attacks are calculated. The model not only prevents deception from the opponent and members of the system, but also effectively limits the attacks of single arbiter. Moreover, the collusion attacks from arbiters and participators are difficult to succeed.
Similar content being viewed by others
References
Brickell, E.F., Stinson, D.R. Authentication codes with multiple arbiters. In Advances in Cryptology-Eurocrypt’88, Lecture Notes in Computer Science, Springer-Verlag, Berlin, 1988, 330: 51–55
Chen, S.D., Zhao, D.W. Two constructions of optimal cartesian authentication codes from unitary geometry over finite fields. Acta Mathematicae Applicatae Sinica, English Series, 29(4): 829–836 (2013)
Chen, S.D., Zhao, D.W. Construction of authentication codes with arbitration over symplectic geometry. Journal of Civil Aviation University of China, 29(1): 51–54 (2011)
Chen, S.D., Zhao, D.W. New construction of authentication codes with arbitration from pseudo-symplectic geometry over finite fields. Ars Combinatoria, 97A: 453–465 (2010)
Chen, S.D., Zhao, D.W. Construction of multi-receiver multi-fold authentication codes from singular symplectic geometry over finite fields. Algebra Colloquium, 20(04): 701–710 (2013)
Chen, S.D., Zhao, D.W. Two constructions of multireceiver authentication codes from symplectic geometry over finite fields. Ars Combinatoria, 99: 193–203 (2011)
Desmedt, Y., Yung, M. Arbitrated unconditionally secure authentication can be unconditionally protected against arbiter’s attacks. Advances in Cryptology. Proceedings of CRYPT’90, 1990, 537: 179–193
Gao, Y., Huo, L.Q. A new construction of the authentication codes with arbitration from singular symplectic geometry over the finite fields. Chinese Journal of Engineering Mathematics, 28(5): 629–641 (2011)
Gao, Y., Huo, L.Q. New construction of the authentication codes with arbitration from singular symplectic geometry. Journal of Civil Aviation University of China, 28(1): 52–56 (2010)
Gao, Y., Shi, X.H., Wang, H.L. Construction of authentication codes with arbitration from singular symplectic geometry over finite fields. Acta Scientiarum Naturalium Universitatias Nankaiensis, 41(6): 72–77 (2008)
Johansson, T. Lower bounds on the probability of deception in authentication with arbitration. IEEE Transcations on Information Theory, 40(5): 1573–1585 (1994)
Johansson, T. Further results on asymmetric authentication schemes. Information and Computation, 151: 100–133 (1999)
Li, Y.X., Wang, X.M. Secret sharing schemes and linear block codes. Journal of China Institute of Communications, 14(3): 22–28 (1993)
Safavi-Naini, R., Wang, Y. A3-codes under collusion attacks. Proc. of Asiacrypt’99, LNCS 1716, Springer-Verlag, Berlin, 1999, 390–398
Shamir, A. How to share a secret. Communication of the ACM, 22(11): 612–613 (1979)
Simmons, G.J. Message authentication with arbitration of transmitter receiver disputes. Proceedings of Crypto’87, Lecture Notes in Computer Science 304. Berlin, 1987, 151–165
Wan, Z.X. Geometry of Classical Groups over Finite Fields (Second Edition). Science Press, Beijing, 2002
Zhou, Z., Hu, Z.M. Authentication code with multiple arbiters. Beijing University of Posts and Telecommunications, 19(4): 75–80 (1996)
Zhou, Z., Hu, Z.M. The constructions of A2-codes from conventional A-codes. Journal of Electronics, 19(4): 489–493 (1997)
Author information
Authors and Affiliations
Additional information
Supported by the National Natural Science Foundation of China (No. 61179026) and the Fundamental Research Funds For the Central Universities (No. 3122013K001).
Rights and permissions
About this article
Cite this article
Chen, Sd., Ma, H. Construction of authentication codes with double arbiters over symplectic geometry. Acta Math. Appl. Sin. Engl. Ser. 31, 1141–1152 (2015). https://doi.org/10.1007/s10255-015-0511-3
Received:
Revised:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10255-015-0511-3