Some New Constructions of Authentication Codes with Arbitration and Multi-Receiver from Singular Symplectic Geometry
Abstract
A new construction of authentication codes with arbitration and multireceiver from singular symplectic geometry over finite fields is given. The parameters are computed. Assuming that the encoding rules are chosen according to a uniform probability distribution, the probabilities of success for different types of deception are also computed.
1. Introduction
- (1)
the maps f and g are surjective;
- (2)
for any m ∈ M and eT ∈ ET, if there is a s ∈ S, satisfying f(s, eT) = m, then such an s is uniquely determined by the given m and eT;
- (3)
p(eT, eR) ≠ 0 and f(s, eT) = m implies g(m, eR) = s, otherwise, g(m, eR) = {reject}.
S, ET, ER, and M are called the set of source states, the set of transmitter’s encoding rules, the set of receiver’s decoding rules, and the set of messages, respectively; f and g are called the encoding map and decoding map, respectively. The cardinals |S|, |ET|, |ER|, and |M| are called the size parameters of the code.
In [1], Simmons introduced the A2-code model to solve the transmitter and the receiver’s distrust problem. In [2–4], some Cartesian authentication codes were constructed from symplectic and unitary geometry; in [5–7], authentication codes with arbitration based on symplectic and pseudosymplectic geometry were constructed.
- (1)
The opponent’s impersonation attack: the largest probability of an opponent’s successful impersonation attack is PI. Then,
- (2)
The opponent’s substitution attack: the largest probability of an opponent’s successful substitution attack is PS. Then,
- (3)
The transmitter’s impersonation attack: the largest probability of a transmitter’s successful impersonation attack is PT. Then,
- (4)
The receiver’s impersonation attack: the largest probability of a receiver’s successful impersonation attack is . Then,
- (5)
The receiver’s substitution attack: the largest probability of a receiver’s successful substitution attack is . Then,
Notes p(eR, eT) ≠ 0 implies that any source s encoded by eT can be authenticated by eR.
2. The First Construction
In this section, we will construct an authentication code with arbitration from singular symplectic geometry over finite fields.
Assume that 2s ≤ 2s0 < m0 ≤ ν + m0, m0 < 2ν − 1 and 1 ≤ k < l. Let P be a subspace 〈v1, v2, e2ν+1〉 of type (3,0, 1) in , and let P0 be a fixed subspace of type (m0 + l, s0, l) which contains P and orthogonal to v2, but not orthogonal to v1.
Assuming that the transmitter’s encoding rules and the receiver’s decoding rules are chosen according to a uniform probability distribution, we can prove that the construction given above results in an A2-code.
Lemma 2.1. The six-tuple (S, ET, ER, M, f, g) is an authentication code with arbitration; that is
- (1)
s + eT = m ∈ M, for all s ∈ S and eT ∈ ET;
- (2)
for any m ∈ M, s = m∩P0 is uniquely information source contained in m and there is eT ∈ ET, such that m = s + eT.
Proof. (1) Let s be a source state, that is, a subspace Q of type (2s + 1 + k, s, k) containing p and contained in p0. Write Ek, Q as
Let eT be a transmitter’s rule, that is, a subspace R of type (5,2, 1) containing P and R∩P0 = P. So, there exists u1, u2 ∈ R, such that R = 〈v1, v2, u1, u2, e2ν+1〉 and
(2) Now, let m be a message; that is, m is a subspace M of type (2s + 3 + k, s + 1, k) which contains P and intersects P0 at a subspace of type (2s + 1 + k, s, k), and is not orthogonal to v2. By definition, P0 contains 〈v1, v2, e2ν+1〉, so P ⊂ M∩P0 = Q, so Q is a source state. Since M ≠ P0, there exists u1, u2 ∈ M but u1, u2 ∉ P0 such that M = Q + 〈u1, u2〉. We have to show that there exists u1, u2 ∈ M such that R = 〈v1, v2, u1, u2, e2ν+1〉 is a subspace of type (5,2, 1), hence a transmitter’s encoding rule.
Assume that R = 〈v1, v2, u1, u2, e2ν+1〉 has been set; if R is a subspace of type (5,2, 1), then we are done. So, suppose that R is not a subspace of type (5,2, 1). Since v2 ∈ Q⊥ and v2 ∉ M⊥, we must have that or . Without loss of generality, let . If we also have , replacing u1 by u1 − u2, we get and . Since R is not a subspace of type (5,2, 1), certainly . Note that Q is a subspace of type (2s + 1 + k, s, k), v1 ∉ Q⊥, so there exists a vector w ∈ Q such that v1KlwT = 1. Replacing u1 by w + u1, we have , . Then, R = 〈v1, v2, u1, u2, e2ν+1〉 is a subspace of type (5,2, 1), and M = Q + R, hence R is a transmitter′s encoding rule.
If there is another source state Q′ such that M = Q′ + R′, we have that Q′ ⊂ M∩P0 = Q. by Q′ ⊂ M, Q′ ⊂ P0. Since dim Q′ = dim Q = 2s + 1 + k, so Q′ = Q. This implies that the source state Q is uniquely determined by M.
Let n1 denote the number of subspaces of type (2s + 1 + k, s, k) contained in 〈v2〉 ⊥ and containing P, n2, the number of subspaces of type (m0 + l, s0, l) contained in 〈v2〉 ⊥ and containing a fixed subspace of type (2s + 1 + k, s, k) as above, and n3, the number of subspaces of type (m0 + l, s0, l) contained in 〈v2〉 ⊥ and containing P and not contained in 〈v1〉 ⊥.
Lemma 2.2. One has
Proof.
(1) Computation of n1. By the transitivity of Sp2v+l(Fq) on the set of subspaces of the same type, we can assume that
Let Q be a subspace of type (2s + 1 + k, s, k) contained in 〈v2〉 ⊥ and containing P. There exists a u ∈ Q such that v1KluT = 1. We may assume that u = (0,0, R1, 1,0, R2, 0,0, R3). So, Q has a matrix representation of the form
It is easy to verify that Q1, Q2 is a subspace of type (2(s − 1), s − 1) in the 2(v − 2)-dimensional symplectic space. The number of this kind of subspace is denoted by N(2(s − 1), s − 1; 2(ν − 2)), Q3 arbitrarily. Furthermore, we may take (Q1, Q2, Q3) as
(2) Computation of n2. Let U be a subspaces of type (m0 + l, s0, l) contained in 〈v2〉 ⊥ and containing a fixed subspace of type (2s + 1 + k, s, k) which contains P, similar to (1), we may assume that U has a matrix representation of the form
(3) Computation of n3. By the same method as that of (1) and (2), let U0 be a subspaces of type (m0 + l, s0, l) contained in 〈v2〉 ⊥, containing P and not contained in 〈v1〉 ⊥. We may assume that the subspace has a matrix representation of the form
So, the number of the subspaces (Q1, Q2) is denoted by N(m0 − 3, s0 − 1; 2(ν − 2)). Then, by the transitivity of Sp2ν+l(Fq) on the set of subspaces of the same type, we can assume that
Lemma 2.3. The number of the source states is
Proof. Since |S| is the number of subspaces of type (2s + 1 + k, s, k) contained in P0 and containing P, we have |S | · n3 = n1 · n2.
Lemma 2.4. The number of the encoding rules of transmitter is
Proof. Since |ET| is the number of subspaces of type (5,2, 1) contained in P0 and containing P, let R = 〈v1, v2, u1, u2, e2ν+1〉, where , and 〈v1, u1〉⊥〈v2, u2〉. By the transitivity of Sp2ν+1(Fq) on the set of subspaces of the same type, we can assume that
Lemma 2.5. The number of the encoding rules of receiver is
Proof. |ER| is the number of type (2,1, 0) intersecting P0 at 〈v2〉. Let H = 〈v2, u〉, where v2KluT = 1. Following the notion of Lemma 2.4, hence u has the form
Lemma 2.6. For any m ∈ M, let the number of eT and eR contained in m be a and b, respectively. Then,
Proof. Let M be a message, and Q = M∩P0, then Q is a source state contained in M. By Lemma 2.1, we may get a transmitter’s encoding rule R contained in M. Let R = 〈v1, v2, u1, u2, e2ν+1〉. Here, . Following the notation of Lemma 2.4, we can assume that Q has a matrix representation of the form
- (1)
Note that M is fixed, so, for u1, the a4, a5, a6, b4, b5, b6, and f3 are fixed and, for u2, the c4, c5, c6, d4, d5, d6, and g3 are fixed. Therefore, the number of u1 is q2(s−1)+(k−1) · (q − 1) and the number of u2 is q2(s−1)+(k−1)+1. Then, the number of eT contained in m is
(2.34) - (2)
Let H = 〈v2, u〉 be a receiver’s encoding rule contained in M, where v2KluT = 1. Clearly, u ∉ Q, then we can assume that u has the form
(2.35)
Lemma 2.7. The number of the messages is
Proof. For any m ∈ M, there is uniquely s ∈ S and eT ∈ ET satisfying m = s + eT; the number of eT is a. Thus,
Lemma 2.8. (1) For any eT ∈ ET, the number of eR contained in eT is q3.
(2) For any eR ∈ ER, the number of eT containing eR is .
Proof. (1) Let R be a transmitter’s encoding rule; we can assume that R = 〈v1, v2, u1, u2, e2ν+1〉. Here, , and 〈v1, u1〉⊥〈v2, u2〉. Then, the receiver’s encoding rule H contained in R should have the form H = 〈v2, k1v1 + k2u1 + u2 + k3e2ν+1〉, where k1, k2, k3 ∈ Fq. So, the number of H is q3.
(2) Let H be a receiver’s encoding rule, and H = 〈v2, u〉, where v2KluT = 1. Therefore, 〈v1, v2, u, e2ν+1〉 is a subspace of type (4,1, 1). The number of subspace 〈v1, v2, u, u1, e2ν+1〉 of type (5,2, 1) is q2ν−4 · ql−1. Here, . Note that and . It is easy to see that the number of u1 ∈ P0 such that 〈v1, v2, u1, e2ν+1〉 is a subspace of type (4,1, 1) is . So, the number of transmitter’s encoding rules eT containing H is .
Lemma 2.9. For any m ∈ M and eR ⊂ m, the number of eT contained in m and containing eR is
Proof. Let M be a message, and let H = 〈v2, u〉 be a receiver’s encoding rule contained in M; we can assume that u = (0,0, 0,0, 0,1, 0,0, 0,0, 0,0), and M has a matrix representation of the form
Note that M is fixed, so a4, b4, f3 are fixed. Assume that R is a transmitter’s encoding rule contained in M and containing H. Let R = 〈v1, v2, u, u1, e2ν+1〉, where . Thus, u1 has the form
Lemma 2.10. Assume that m1 and m2 are two distinct messages which commonly contain a transmitter’s encoding rule . s1 and s2 contained in m1 and m2 are two source states, respectively. Assume that s0 = s1 ⋂ s2, dim s0 = k1, then 3 ≤ k1 ≤ 2s + k, and
- (1)
the number of eR contained in m1 ⋂ m2 is;
- (2)
for any eR ⊂ m1 ⋂ m2, the number of eT containing eR is .
Proof. Since , , and m1 ≠ m2, then s1 ≠ s2. Again because of s1⊃P0 and s2⊃P0, 3 ≤ k1 ≤ 2s + k. From , it is easy to know that . Therefore,
- (1)
By the definition of the message, we can assume that m1 and m2 have the form as follows, respectively:
Since R1, R4 are arbitrary, every row of (0 0 R3 0 1 R6 R7) is the linear combination of the base
- (2)
Assume that m1 ⋂ m2 has the form of (2.46), then, for any eR ⊂ m1 ⋂ m2, we can assume that
(2.51)
Theorem 2.11. The above construction yields anA2-code with the following size parameters:
Proof. (1) The number of m containing eR is b, then
- (2)
Assume that opponent gets m1, which is from transmitter, and sends m2 instead of m1, when s1 contained in m1 is different from s2 contained in m2; the opponent’s substitution attack can be successful. Because eR ⊂ eT ⊂ m1, the opponent selects satisfying and dim (s1 ⋂ s2) = k1, then
- (3)
Assume that R is transmitter’s encoding rules, Q is a source state, and M = R + Q. Therefore, the number of receiver’s encoding rules contained in R is q3. Let M′ be another message, such that M′ = R′ + Q and R ≠ R′. Then, eR contained R ⋂ M′ is at most q. So,
- (5)
Assume that the receiver declares to receive a message m2 instead of m1, when s2 contained in m1 is different from s2 contained in m2; the receiver’s substitution attack can be successful. Since eR ⊂ eT ⊂ m1, receiver is superior to select , satisfying , thus , and dim (s1∩s2) = k1 as large as possible. Therefore, the probability of a receiver’s successful substitution attack is
3. The Second Construction
In this section, from singular symplectic geometry and the first construction, we construct an authentication code with a transmitter and multi-receivers and compute the probabilities of success for different types of deceptions. For the definition of multi-receiver authentication codes, refer to [9].
Let 2s ≤ 2s0 < m0 ≤ ν + m0, m0 < 2ν − 1, and 1 ≤ k < l. Let p be a subspace 〈v1, v2, e2ν+1〉 of type (3,0, 1) in , and let P0 be a fixed subspace of type (m0 + l, s0, l) which contains P and orthogonal to v2, but not orthogonal to v1. Let S = {s∣s is a subspace of type (2s + 1 + k, s, k), P ⊂ s ⊂ P0}, Let E = {e∣e is a subspace of type (5,2, 1), eT ⋂ P0 = P}, Let M = {m∣m is a subspace of type (2s + 3 + k, s + 1, k), P ⊂ m, v2 ∉ m⊥, m ⋂ P0 is a subspace of type (2s + 1 + k, s, k)}, and let M* = {(m1, m2, …, mλ) | m1 ⋂ U⊥ = m2 ⋂ U⊥ = … = mλ ⋂ U⊥}.
First, we construct (λ + 1)A-codes. Let C = (S, Eλ, M*, f), where S, Eλ, and M* are the sets of source states, keys, and authenticators of C, respectively, and f : S × Eλ → M*, f(s, e) = (s + e1, s + e2, …, s + eλ) for e = (e1, e2, …, eλ) ∈ Eλ is the authentication mapping of C. Let Ci = (S, Ei, Mi; fi), where S, Ei = E and Mi = M are the sets of source states, keys, and authenticators of Ci, respectively, and fi : S × Ei → Mi, fi(s, ei) = s + ei for ei ∈ Ei, is the authentication mapping of Ci. It is easy to know that C and Ci are well-defined A-codes.
Therefore, πi(f(s, e)) = fi((Is × πi)(s, e)). Thus, our scheme is indeed a well-defined authentication code with a transmitter and multi-receivers.
Theorem 3.1. In the construction of multi-receiver authentication codes, if the encoding rules are chosen according to a uniform probability distribution, then the probabilities of impersonation attack and substitution attack are, respectively,
Proof. Let , then
Two types of construction of authentication codes from singular symplectic geometry over finite fields are given. Among them, in the first construction, based on singular symplectic geometry structure of the authentication code with arbitration, the greatest probabilities of success for different types of deceptions are relatively lower, therefore there are some advantages. In addition, the second construction is based on singular symplectic geometry and is a multi-receiver authentication code. The probabilities of success for different types of deceptions are also computed. The results about multi-receiver authentication codes based on singular symplectic geometry are fewer. Thus, the structure of authentication code and the theory for further discussion are very meaningful.
Acknowledgments
This work is supported by the National Natural Science Foundation of China under Grant no. 61179026 and the Natural Science Foundation of Tianjin City under Grant no. 08JCYBJC13900.