Computer Engineering and Applications ›› 2013, Vol. 49 ›› Issue (18): 86-88.

Previous Articles     Next Articles

New construction of cartesian authentication codes

ZHAO Yongpeng1, ZHOU Houchun2   

  1. 1.School of Mathematical Sciences, Shandong Normal University, Jinan 250014, China
    2.School of Sciences, Linyi University, Linyi, Shandong 276005, China
  • Online:2013-09-15 Published:2013-09-13

构造一类cartesian认证码的新方法

赵永鹏1,周厚春2   

  1. 1.山东师范大学 数学科学学院,济南 250014
    2.临沂大学 理学院,山东 临沂 276005

Abstract: The cartesian authentication codes based on k-spanning tree are constructed and their parameters are derived. The probabilities of success for the impersonation attack, the substitution attack and r-spoofing attack are also computed respectively based on the assumption of the encoding rules which are chosen according to a uniform probability distribution. These results extend results given by Wang Yongchuan and Yang Yixian.

Key words: cartesian authentication code, k-spanning tree, r-spoofing attack, lower bound of information theory

摘要: 利用完全图[Kn]中的k-生成树性质构造了一个新的cartesian认证码,计算了码参数,当编码规则按照均匀的概率分布被选取时,计算了该码的成功冒充攻击概率、成功替换攻击概率和[r]阶欺骗攻击成功的概率,改进了已有的相关结果。

关键词: cartesian认证码, k-生成树, [r]阶欺骗攻击, 信息论下界