Skip to main content
Log in

Three Constructions of Authentication Codes with Perfect Secrecy

  • Published:
Designs, Codes and Cryptography Aims and scope Submit manuscript

Abstract

In this paper, we present three algebraic constructions of authentication codes with secrecy. The first and the third class are optimal. Some of the codes in the second class are optimal, and others in the second class are asymptotically optimal. All authentication codes in the three classes provide perfect secrecy.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. E. F. Brickel, A few results in message authentication, Congressus Numerantium, Vol. 43 (1984) pp. 141–154.

    Google Scholar 

  2. L. R. A. Casse, K. M. Martin and P. R. Wild, Bounds and characterizations of authentication/ secrecy schemes, Designs, Codes and Cryptography, Vol. 13 (1998) pp. 107–129.

    Google Scholar 

  3. S. Chanson, C. Ding and A. Salomaa, Cartesian authentication codes from functions with optimal nonlinearity, Theoretical Computer Science, Vol. 290 (2003) pp. 1737–1752.

    Google Scholar 

  4. M. De Soete, Some constructions for authentication-secrecy codes, Advances in Cryptology: Eurocrypt' 88, Lecture Notes in Computer Science, Springer-Verlag, New York, Vol. 330 (1988) pp. 57–76.

    Google Scholar 

  5. E. Gilbert, F. J. MacWilliams and N. J. A. Sloane, Codes which detect deception, Bell Systems Tech. J., Vol. 53 (1974) pp. 405–424.

    Google Scholar 

  6. J. L. Massey, Cryptography-A Selective Survey, Digital Communications, North-Holland (1986) pp. 3–21.

  7. C. Mitchell, M. Walker and P. Wild, The combinatorics of perfect authentication schemes, SIAM J. Disc. Math., Vol. 7 (1994) pp. 102–107.

    Google Scholar 

  8. D. Pei, Information-theoretic bounds for authentication codes and block designs, J. Cryptology, Vol. 8 (1995) pp. 177–188.

    Google Scholar 

  9. R. S. Rees and D. R. Stinson, Combinatorial characterizations of authentication codes, Designs, Codes and Cryptography, Vol. 7 (1996) pp. 239–259.

    Google Scholar 

  10. U. Rosenbaum, A lower bound on authentication after having observed a sequence of messages, J. Cryptology, Vol. 6 (1993) pp. 135–156.

    Google Scholar 

  11. R. Safavi-Naini and L. Tombak, Authentication codes in plaintext and chosen-content attacks, Advances in Cryptology: Eurocrypt' 94, Lecture Notes in Computer Science, Vol. 950 (1995) pp. 254–265.

  12. A. Sgarro, Information-theoretic bounds for authentication frauds, J. Computer Security, Vol. 2 (1993) pp. 53–63.

    Google Scholar 

  13. C. E. Shannon, Communication theory of secrecy systems, Bell System Tech. J., Vol. 28 (1949) pp. 656–715.

    Google Scholar 

  14. G. J. Simmons, Authentication theory/coding theory, Advances in Cryptology: Crypto' 84, Lecture Notes in Computer Science, Vol. 196 (1984) pp. 411–431.

  15. D. R. Stinson, A construction for authentication/secrecy codes from certain combinatorial designs, J. Cryptology, Vol. 1 (1988) pp. 119–127.

    Google Scholar 

  16. D. R. Stinson and L. Teirlinck, A construction for authentication/secrecy codes from 3-homogeneous permutation groups, European J. Combin., Vol. 11 (1990) pp. 73–79.

    Google Scholar 

  17. T. van Trung, On the construction of authentication and secrecy codes, Designs, Codes and Cryptography, Vol. 5 (1995) pp. 269–280.

    Google Scholar 

Download references

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Ding, C., Tian, X. Three Constructions of Authentication Codes with Perfect Secrecy. Designs, Codes and Cryptography 33, 227–239 (2004). https://doi.org/10.1023/B:DESI.0000036248.82691.11

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1023/B:DESI.0000036248.82691.11

Navigation