Volume 2011, Issue 1 675484
Research Article
Open Access

Some New Constructions of Authentication Codes with Arbitration and Multi-Receiver from Singular Symplectic Geometry

You Gao

Corresponding Author

You Gao

College of Science, Civil Aviation University of China, Tianjin 300300, China cauc.edu.cn

Search for more papers by this author
Huafeng Yu

Huafeng Yu

College of Science, Civil Aviation University of China, Tianjin 300300, China cauc.edu.cn

Search for more papers by this author
First published: 22 December 2011
Academic Editor: Junjie Wei

Abstract

A new construction of authentication codes with arbitration and multireceiver from singular symplectic geometry over finite fields is given. The parameters are computed. Assuming that the encoding rules are chosen according to a uniform probability distribution, the probabilities of success for different types of deception are also computed.

1. Introduction

Let S, ET, ER, and M be four nonempty finite sets, and let f : S × ETM and g : M × ERS ∪ {reject}  be two maps. The six-tuple (S, ET, ER, M, f, g) is called an authentication code with arbitration (A2-code) if
  • (1)

    the maps f and g are surjective;

  • (2)

    for any mM and eTET, if there is a sS, satisfying f(s, eT) = m, then such an s is uniquely determined by the given m and eT;

  • (3)

    p(eT, eR) ≠ 0 and f(s, eT) = m implies g(m, eR) = s, otherwise, g(m, eR) = {reject}.

S, ET, ER, and M are called the set of source states, the set of transmitter’s encoding rules, the set of receiver’s decoding rules, and the set of messages, respectively; f and g are called the encoding map and decoding map, respectively. The cardinals |S|, |ET|, |ER|, and |M| are called the size parameters of the code.

In [1], Simmons introduced the A2-code model to solve the transmitter and the receiver’s distrust problem. In [24], some Cartesian authentication codes were constructed from symplectic and unitary geometry; in [57], authentication codes with arbitration based on symplectic and pseudosymplectic geometry were constructed.

The following notations will be fixed throughout this paper: p is a fixed prime. Fq is a field with q elements. is a singular symplectic space over Fq with index ν. ei  (1 ≤ i ≤ 2ν + l) is row vector in V whose ith coordinate is 1 and all other coordinates are 0. Denote by E the l-dimensional subspace of V generated by e2ν+1, e2ν+2, …, e2ν+l. Kl denotes the matrix
(1.1)
For more concepts and notations used in this paper, refer to [8].
In an authentication system that permits arbitration, the model includes four attendance: the transmitter, the receiver, the opponent, and the arbiter and includes five attacks.
  • (1)

    The opponent’s impersonation attack: the largest probability of an opponent’s successful impersonation attack is PI. Then,

(1.2)
  • (2)

    The opponent’s substitution attack: the largest probability of an opponent’s successful substitution attack is PS. Then,

(1.3)
  • (3)

    The transmitter’s impersonation attack: the largest probability of a transmitter’s successful impersonation attack is PT. Then,

(1.4)
  • (4)

    The receiver’s impersonation attack: the largest probability of a receiver’s successful impersonation attack is . Then,

(1.5)
  • (5)

    The receiver’s substitution attack: the largest probability of a receiver’s successful substitution attack is . Then,

(1.6)

Notes p(eR, eT) ≠ 0 implies that any source s encoded by eT can be authenticated by eR.

2. The First Construction

In this section, we will construct an authentication code with arbitration from singular symplectic geometry over finite fields.

Assume that 2s ≤ 2s0 < m0ν + m0, m0 < 2ν − 1 and 1 ≤ k < l. Let P be a subspace 〈v1, v2, e2ν+1〉 of type (3,0, 1) in , and let P0 be a fixed subspace of type (m0 + l, s0, l) which contains P and orthogonal to v2, but not orthogonal to v1.

Our authentication code is a six-tuple
(2.1)
where the set of source states
(2.2)
the set of transmitter’s encoding rules:
(2.3)
the set of receiver’s decoding rules:
(2.4)
the set of messages:
(2.5)
the encoding function:
(2.6)
and the decoding function: g : M × ERS ∪ {reject},
(2.7)

Assuming that the transmitter’s encoding rules and the receiver’s decoding rules are chosen according to a uniform probability distribution, we can prove that the construction given above results in an A2-code.

Lemma 2.1. The six-tuple (S, ET, ER, M, f, g) is an authentication code with arbitration; that is

  • (1)

    s + eT = mM, for all sS and eTET;

  • (2)

    for any mM, s = mP0 is uniquely information source contained in m and there is eTET, such that m = s + eT.

Proof. (1) Let s be a source state, that is, a subspace Q of type (2s + 1 + k, s, k) containing p and contained in p0. Write Ek, Q as

(2.8)
which satisfies
(2.9)

Let eT be a transmitter’s rule, that is, a subspace R of type (5,2, 1) containing P and RP0 = P. So, there exists u1, u2R, such that R = 〈v1, v2,   u1,   u2, e2ν+1〉 and

(2.10)
Therefore, M = Q + 〈u1, u2〉 is a subspace of type (2s + 3 + k, s + 1, k) which contains P and MP0 = Q is a subspace of type (2s + 1 + k, s, k), and is not orthogonal to v2, hence a message.

(2) Now, let m be a message; that is, m is a subspace M of type (2s + 3 + k, s + 1, k) which contains P and intersects P0 at a subspace of type (2s + 1 + k, s, k), and is not orthogonal to v2. By definition, P0 contains 〈v1, v2, e2ν+1〉, so PMP0 = Q, so Q is a source state. Since MP0, there exists u1, u2M but u1, u2P0 such that M = Q + 〈u1, u2〉. We have to show that there exists u1, u2M such that R = 〈v1, v2, u1, u2, e2ν+1〉 is a subspace of type (5,2, 1), hence a transmitter’s encoding rule.

Assume that R = 〈v1, v2, u1, u2, e2ν+1〉 has been set; if R is a subspace of type (5,2, 1), then we are done. So, suppose that R is not a subspace of type (5,2, 1). Since v2Q and v2M, we must have that or . Without loss of generality, let . If we also have , replacing u1 by u1u2, we get and . Since R is not a subspace of type (5,2, 1), certainly . Note that Q is a subspace of type (2s + 1 + k, s, k), v1Q, so there exists a vector wQ such that v1KlwT = 1. Replacing u1 by w + u1, we have , . Then, R = 〈v1, v2, u1, u2, e2ν+1〉 is a subspace of type (5,2, 1), and M = Q + R, hence R is a transmitter′s encoding rule.

If there is another source state Q such that M = Q + R, we have that QMP0 = Q. by QM, QP0. Since dim Q = dim Q = 2s + 1 + k, so Q = Q. This implies that the source state Q is uniquely determined by M.

Let n1 denote the number of subspaces of type (2s + 1 + k, s, k) contained in 〈v2〉  and containing P, n2, the number of subspaces of type (m0 + l, s0, l) contained in 〈v2〉  and containing a fixed subspace of type (2s + 1 + k, s, k) as above, and n3, the number of subspaces of type (m0 + l, s0, l) contained in 〈v2〉  and containing P and not contained in 〈v1〉 .

Lemma 2.2. One has

(2.11)

Proof.

(1) Computation of n1. By the transitivity of Sp2v+l(Fq) on the set of subspaces of the same type, we can assume that

(2.12)

Let Q be a subspace of type (2s + 1 + k, s, k) contained in 〈v2〉  and containing P. There exists a uQ such that v1KluT = 1. We may assume that u = (0,0, R1, 1,0, R2, 0,0, R3). So, Q has a matrix representation of the form

(2.13)

It is easy to verify that Q1, Q2 is a subspace of type (2(s − 1), s − 1) in the 2(v − 2)-dimensional symplectic space. The number of this kind of subspace is denoted by N(2(s − 1), s − 1;   2(ν − 2)), Q3 arbitrarily. Furthermore, we may take (Q1, Q2, Q3) as

(2.14)
to compute n1, where b = (ν − 2) − (s − 1). Since Q has a matrix representation of the form
(2.15)
where a = s − 1  and  b = νs − 1, we have that
(2.16)

(2) Computation of n2. Let U be a subspaces of type (m0 + l, s0, l) contained in 〈v2〉  and containing a fixed subspace of type (2s + 1 + k, s, k) which contains P, similar to (1), we may assume that U has a matrix representation of the form

(2.17)
where a = s − 1, b = νs − 1, so (P1, P2) is a subspace of type (m0 − (2s + 1), s0s) in the 2(vs − 1)-dimensional symplectic space. We have that
(2.18)

(3) Computation of n3. By the same method as that of (1) and (2), let U0 be a subspaces of type (m0 + l, s0, l) contained in 〈v2〉 , containing P and not contained in 〈v1〉 . We may assume that the subspace has a matrix representation of the form

(2.19)

So, the number of the subspaces (Q1, Q2) is denoted by N(m0 − 3, s0 − 1;   2(ν − 2)). Then, by the transitivity of Sp2ν+l(Fq) on the set of subspaces of the same type, we can assume that

(2.20)
where c = s0 − 1, a = m0 − 2s0 − 1, b = νm0 + s0, a5, b4, b5 arbitrarily. We may get
(2.21)

Lemma 2.3. The number of the source states is

(2.22)

Proof. Since |S| is the number of subspaces of type (2s + 1 + k, s, k) contained in P0 and containing P, we have |S | · n3 = n1 · n2.

Lemma 2.4. The number of the encoding rules of transmitter is

(2.23)

Proof. Since |ET| is the number of subspaces of type (5,2, 1) contained in P0 and containing P, let R = 〈v1, v2, u1, u2, e2ν+1〉, where , and 〈v1, u1〉⊥〈v2, u2〉. By the transitivity of Sp2ν+1(Fq) on the set of subspaces of the same type, we can assume that

(2.24)
where c = s0 − 1, a = m0 − 2s0 − 1, and  b = νm0 + s0. Therefore, u1 and u2 have the respective forms:
(2.25)
Note that u2P0 and dim (Rp0) = 3, so the vector u1 cannot lie in P0. Then, a5, b4, b5 cannot equal zero at the same time. Thus, the number of u1 is and that for u2 is q2(ν−2)+(l−1); we may get
(2.26)

Lemma 2.5. The number of the encoding rules of receiver is

(2.27)

Proof. |ER| is the number of type (2,1, 0) intersecting P0 at 〈v2〉. Let H = 〈v2, u〉, where v2KluT = 1. Following the notion of Lemma 2.4, hence u has the form

(2.28)
Clearly, uP0. The number of u is q2ν−2 · ql, that is,
(2.29)

Lemma 2.6. For any mM, let the number of eT and eR contained in m be a and b, respectively. Then,

(2.30)

Proof. Let M be a message, and Q = MP0, then Q is a source state contained in M. By Lemma 2.1, we may get a transmitter’s encoding rule R contained in M. Let R = 〈v1, v2, u1, u2, e2ν+1〉. Here, . Following the notation of Lemma 2.4, we can assume that Q has a matrix representation of the form

(2.31)
where a = m0 − 2s0 − 1, b = ν + s0m, c = s0s, and  d = s − 1. By and R being the subspace of type (5,2, 1), we can assume
(2.32)
where b1 ≠ 0. Then,
(2.33)
where a = m0 − 2s0 − 1, b = ν + s0m, c = s0s,   and  d = s − 1.
  • (1)

    Note that M is fixed, so, for u1, the a4, a5, a6, b4, b5, b6, and f3 are fixed and, for u2, the c4, c5, c6, d4, d5, d6, and g3 are fixed. Therefore, the number of u1 is q2(s−1)+(k−1) · (q − 1) and the number of u2 is q2(s−1)+(k−1)+1. Then, the number of eT contained in m is

    (2.34)

  • (2)

    Let H = 〈v2, u〉 be a receiver’s encoding rule contained in M, where v2KluT = 1. Clearly, uQ, then we can assume that u has the form

    (2.35)

Note that
(2.36)
where kFq. Therefore, the number of (h4, h5, h6, i4, i5, i6, j3) is q. Then, the number of eR contained in m is
(2.37)

Lemma 2.7. The number of the messages is

(2.38)

Proof. For any mM, there is uniquely sS and eTET satisfying m = s + eT; the number of eT is a. Thus,

(2.39)

Lemma 2.8. (1) For any eTET, the number of eR contained in eT is q3.

(2) For any eRER, the number of eT containing eR is .

Proof. (1) Let R be a transmitter’s encoding rule; we can assume that R = 〈v1, v2, u1, u2, e2ν+1〉. Here, , and 〈v1, u1〉⊥〈v2, u2〉. Then, the receiver’s encoding rule H contained in R should have the form H = 〈v2, k1v1 + k2u1 + u2 + k3e2ν+1〉, where k1, k2, k3Fq. So, the number of H is q3.

(2) Let H be a receiver’s encoding rule, and H = 〈v2, u〉, where v2KluT = 1. Therefore, 〈v1, v2, u, e2ν+1〉 is a subspace of type (4,1, 1). The number of subspace 〈v1, v2, u, u1, e2ν+1〉 of type (5,2, 1) is q2ν−4 · ql−1. Here, . Note that and . It is easy to see that the number of u1P0 such that 〈v1, v2, u1, e2ν+1〉 is a subspace of type (4,1, 1) is . So, the number of transmitter’s encoding rules eT containing H is .

Lemma 2.9. For any mM and eRm, the number of eT contained in m and containing eR is

(2.40)

Proof. Let M be a message, and let H = 〈v2, u〉 be a receiver’s encoding rule contained in M; we can assume that u = (0,0, 0,0, 0,1, 0,0, 0,0, 0,0), and M has a matrix representation of the form

(2.41)
where b1 ≠ 0, a = s − 1, and  b = νs − 1.

Note that M is fixed, so a4, b4, f3 are fixed. Assume that R is a transmitter’s encoding rule contained in M and containing H. Let R = 〈v1, v2, u, u1, e2ν+1〉, where . Thus, u1 has the form

(2.42)
where d1 ≠ 0. Note that (c4, d4, g3) = k(a4, b4, f3) and u1P0, so k ≠ 0. Hence, u1, c4, d4, and g3 are fixed. Then, the number of u1 is q2(s−1)+(k−1) · (q − 1); that is, the number of R is q2(s−1)+(k−1) · (q − 1).

Lemma 2.10. Assume that m1 and m2 are two distinct messages which commonly contain a transmitter’s encoding rule . s1 and s2 contained in m1 and m2 are two source states, respectively. Assume that s0 = s1s2, dim   s0 = k1, then 3 ≤ k1 ≤ 2s + k, and

  • (1)

    the number of eR contained in m1m2 is;

  • (2)

    for any eRm1m2, the number of eT containing  eR is .

Proof. Since , , and m1m2, then s1s2. Again because of s1P0 and s2P0, 3 ≤ k1 ≤ 2s + k. From , it is easy to know that . Therefore,

(2.43)
  • (1)

    By the definition of the message, we can assume that m1 and m2 have the form as follows, respectively:

(2.44)
where b4 ≠ 0,
(2.45)
where d4 ≠ 0. Thus,
(2.46)
where g4 ≠ 0. Since dim (m1m2) = k1 + 2, therefore
(2.47)
If eRm1m2, then
(2.48)

Since R1, R4 are arbitrary, every row of (0 0 R3 0 1 R6R7) is the linear combination of the base

(2.49)
thus the number of it is . So, it is easy to know that the number of eR contained in m1m2 is
(2.50)

  • (2)

    Assume that m1m2 has the form of (2.46), then, for any eRm1m2, we can assume that

    (2.51)

If eReT and eTm1m2, then
(2.52)
where
(2.53)
is the linear combination on the basis of
(2.54)
then the number of eT containing eR is .

Theorem 2.11. The above construction yields anA2-code with the following size parameters:

(2.55)
Moreover, assume that the encoding rules eT and eR are chosen according to a uniform probability distribution, the largest probabilities of success for different types of deceptions:
(2.56)

Proof. (1) The number of m containing eR is b,   then

(2.57)
  • (2)

    Assume that opponent gets m1, which is from transmitter, and sends m2 instead of m1, when s1 contained in m1 is different from s2 contained in m2; the opponent’s substitution attack can be successful. Because eR  eTm1, the opponent selects satisfying and dim (s1s2) = k1, then

(2.58)
where k1 = 2s + k.
  • (3)

    Assume that R is transmitter’s encoding rules, Q is a source state, and M = R + Q. Therefore, the number of receiver’s encoding rules contained in R is q3. Let M be another message, such that M = R + Q and RR. Then, eR contained RM is at most q. So,

(2.59)
  • (4)

    From Lemmas 2.8 and 2.9, thus

(2.60)
  • (5)

    Assume that the receiver declares to receive a message m2 instead of m1,   when s2 contained in m1 is different from s2 contained in m2; the receiver’s substitution attack can be successful. Since eReTm1, receiver is superior to select , satisfying , thus , and dim (s1s2) = k1 as large as possible. Therefore, the probability of a receiver’s successful substitution attack is

(2.61)
where k1 = 2s + k.

3. The Second Construction

In this section, from singular symplectic geometry and the first construction, we construct an authentication code with a transmitter and multi-receivers and compute the probabilities of success for different types of deceptions. For the definition of multi-receiver authentication codes, refer to [9].

Let 2s ≤ 2s0 < m0ν + m0, m0 < 2ν − 1, and 1 ≤ k < l. Let p be a subspace 〈v1, v2, e2ν+1〉 of type (3,0, 1) in , and let P0 be a fixed subspace of type (m0 + l, s0, l) which contains P and orthogonal to v2, but not orthogonal to v1. Let S = {ss  is  a  subspace  of  type  (2s + 1 + k, s, k), PsP0}, Let E = {ee  is  a  subspace  of  type  (5,2, 1), eTP0 = P}, Let M = {mm  is  a  subspace  of  type  (2s + 3 + k, s + 1, k), Pm,   v2m, mP0  is  a  subspace  of  type  (2s + 1 + k, s, k)}, and let M* = {(m1, m2, …, mλ) | m1U = m2U = … = mλU}.

First, we construct (λ + 1)A-codes. Let C = (S, Eλ, M*, f), where S, Eλ,   and  M* are the sets of source states, keys, and authenticators of C, respectively, and f : S × EλM*, f(s, e) = (s + e1, s + e2, …, s + eλ) for e = (e1, e2, …, eλ) ∈ Eλ is the authentication mapping of C. Let Ci = (S, Ei, Mi; fi), where S, Ei = E and Mi = M are the sets of source states, keys, and authenticators of Ci, respectively, and fi : S × EiMi, fi(s, ei) = s + ei for eiEi, is the authentication mapping of Ci. It is easy to know that C and Ci are well-defined A-codes.

Our authentication scheme is a (λ + 1)-tuple  C;C1, C2, …, Cλ. Let τi : EλEi, τi(e) = ei for e = (e1, e2, …, eλ) ∈ Eλ, and let πi : M*Mi, πi(m) = mi for m = (m1, m2, …, mλ). Then,
(3.1)

Therefore, πi(f(s, e)) = fi((Is × πi)(s, e)). Thus, our scheme is indeed a well-defined authentication code with a transmitter and multi-receivers.

Theorem 3.1. In the construction of multi-receiver authentication codes, if the encoding rules are chosen according to a uniform probability distribution, then the probabilities of impersonation attack and substitution attack are, respectively,

(3.2)
where J = {i1, i2, …, ij}, iJ.

Proof. Let , then

(3.3)
It is easy to know that |eEλτJ(e) = eJ | = |E|λj, and
(3.4)
From Lemma 2.6, we know that the number of ei satisfying (3.4) is a. For any ei satisfying (3.4), the number of e satisfying τJ(e), τi(e) = ei is |E|λJ−1. So,
(3.5)
and a = q4s+2k−5, thus
(3.6)
Now, we compute the probability of substitution attack: we know that
(3.7)
and , whenever , while
(3.8)
and , therefore
(3.9)
where k1 = 2s + k.

Two types of construction of authentication codes from singular symplectic geometry over finite fields are given. Among them, in the first construction, based on singular symplectic geometry structure of the authentication code with arbitration, the greatest probabilities of success for different types of deceptions are relatively lower, therefore there are some advantages. In addition, the second construction is based on singular symplectic geometry and is a multi-receiver authentication code. The probabilities of success for different types of deceptions are also computed. The results about multi-receiver authentication codes based on singular symplectic geometry are fewer. Thus, the structure of authentication code and the theory for further discussion are very meaningful.

Acknowledgments

This work is supported by the National Natural Science Foundation of China under Grant no. 61179026 and the Natural Science Foundation of Tianjin City under Grant no. 08JCYBJC13900.

      The full text of this article hosted at iucr.org is unavailable due to technical difficulties.