Bounds and combinatorial structure of \((k,n)\) multi-receiver \(A\)-codes (Q1841526)

From MaRDI portal
scientific article
Language Label Description Also known as
English
Bounds and combinatorial structure of \((k,n)\) multi-receiver \(A\)-codes
scientific article

    Statements

    Bounds and combinatorial structure of \((k,n)\) multi-receiver \(A\)-codes (English)
    0 references
    0 references
    0 references
    18 February 2001
    0 references
    The model of \((k,n)\) multi-receiver \(A\)-codes generalizes the usual model of unconditionally secure authentication codes (\(A\)-codes) -- not only an outside opponent but also any \(k-1\) receivers (out of given \(n\) receivers) cannot cheat any other receiver. In the paper lower bounds on the cheating probabilities (Section 4) and the sizes of keys (Section 5) of \((k,n)\) multi-receiver \(A\)-codes are derived. These bounds are tight as shown by the scheme proposed by \textit{Y. Desmedt, Y. Frankel} and \textit{M. Yung} [Multi-receiver/multi-sender network security: Efficient authenticated multicast/feedback, IEEE Infocom'92, 2045-2054 (1992)] that meets all the bounds (thus it is optimal). In Section 6 the authors also introduce a notion of TWOOA, where TWOOA denotes a pair of orthogonal arrays that satisfy a certain condition. It is then shown that an optimum \((k,n)\) multi-receiver \(A\)-code is equivalent to a TWOOA.
    0 references
    authentication code
    0 references
    multi-receiver
    0 references
    lower bounds
    0 references
    cheating probabilities
    0 references
    orthogonal arrays
    0 references
    0 references

    Identifiers