1. Combinational constructions of splitting authentication codes with perfect secrecy.
- Author
-
Ji, Lijun, Liang, Miao, and Wang, Yanting
- Subjects
BLOCK designs ,LINEAR codes ,DIVISIBILITY groups ,INTEGERS - Abstract
Splitting authentication codes were first introduced by Simmons in 1982. Ogata et al. introduced (v , u × c , 1) -splitting balanced incomplete block designs in 2006 in order to construct twofold optimal c-splitting authentication codes. In 2020, Paterson and Stinson showed that there exists an authentication code with perfect secrecy for u uniformly distributed source states that is ϵ -secure against message-substitution and key-substitution attacks if and only if there exists an ϵ -secure robust (2, 2)-threshold scheme for u uniformly distributed secrets, and they used an equitably ordered (v , u × c , 1) -splitting balanced incomplete block design (briefly a (v , u × c , 1) -ESBIBD) to construct a (1/cu)-secure robust (2, 2)-threshold scheme for u equiprobable secrets. Note that v ≡ 1 (mod u (u - 1) c) and v (v - 1) ≡ 0 (mod u (u - 1) c 2) if there is a (v , u × c , 1) -ESBIBD. In order to consider other orders v, we generalize the concept of a (v , u × c , 1) -ESBIBD to an equitably ordered (v , u × c , 1) -splitting packing design (briefly a (v , u × c , 1) -ESPD), which can also be used to construct a (1/cu)-secure robust (2, 2)-threshold scheme for u equiprobable secrets. In this paper, we study combinatorial constructions of (v , u × c , 1) -ESPDs and determine the existence of an optimal (v , u × c , 1) -ESPD for (u , c) ∈ { (2 , k) : k is a positive integer } ∪ { (3 , 1) , (4 , 1) , (3 , 2) } . Consequently, we obtain some new infinite classes of authentication codes with perfect secrecy and (1/cu)-secure robust (2, 2)-threshold schemes. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF