首页 | 本学科首页   官方微博 | 高级检索  
     

利用强部分平衡t-设计构造分裂认证码
引用本文:王秀丽,曹苗,王利娜. 利用强部分平衡t-设计构造分裂认证码[J]. 应用科学学报, 2020, 38(6): 1006-1016. DOI: 10.3969/j.issn.0255-8297.2020.06.017
作者姓名:王秀丽  曹苗  王利娜
作者单位:1. 中国民航大学 理学院, 天津 300300;2. 北京师范大学静海附属学校 中学部, 天津 301600
基金项目:中央高校基本科研业务费中国民航大学自然科学类重点项目(No.3122019192)资助
摘    要:本文在有限域上的二维向量空间中构造了一个带约束的强部分平衡设计,在此基础上构造了完善分裂认证码.首先,借助方程组的理论构造了一个强部分平衡t-设计,得到了第一类分裂认证码.然后对第一类构造增加限制条件,得到了第二类分裂认证码.分别计算了两类认证码的r-阶欺骗攻击成功概率,并证明了它们分别是Ⅰ型和Ⅱ型的完善认证码.最后,分析了所构造认证码的性能.通过对具体实例的编码矩阵进行数值仿真,验证了本文构造的合理性和相应结论的正确性.通过与相关文献的结果进行对比,得出如下结论:本文信源数目较多,各阶欺骗攻击成功概率都达到最小;且所用理论较基础,编码算法更简单,模拟仿真易于实现.因此本文所构造的认证码,无论从传送信息量还是从安全性与实用性的角度来看,均具有一定的优势.

关 键 词:可裂认证码  部分平衡t-设计  带约束的强部分平衡t-设计  有限域  向量空间
收稿时间:2020-04-06

Construction of Splitting Authentication Codes Using Strongly Partially Balanced t-Design
WANG Xiuli,CAO Miao,WANG Lina. Construction of Splitting Authentication Codes Using Strongly Partially Balanced t-Design[J]. Journal of Applied Sciences, 2020, 38(6): 1006-1016. DOI: 10.3969/j.issn.0255-8297.2020.06.017
Authors:WANG Xiuli  CAO Miao  WANG Lina
Affiliation:1. College of Science, Civil Aviation University of China, Tianjin 300300, China;2. Senior school, Jinghai Affiliated School of Beijing Normal University, Tianjin 301600, China
Abstract:In this paper, we propose a restricted strongly partially-balanced t-design in a finite two-dimension vector space, and construct a perfect splitting authentication code on the basis of this design. First, based on the theory of equations, a strongly partially-balanced t-design is constructed, and directly one type of splitting authentication codes is obtained. Second, one more type of authentication codes is generated by adding constraints to the above construction process. The two types of codes are proved perfect on splitting authentication by calculating their r-order probabilities of successful spoofing attacks respectively. Finally, the performances of two types of codes are analyzed. By simulations with a specific example, the rationality and validity of the construction approaches are verified. Compared with previous works, it is concluded that in this method, the successful probability of each order deception attack could reach the minimum by using large number of sources, and that the coding algorithm and simulation are easy to implement due to its simple theoretical basis. Therefore, the code constructed in this paper is competitive in terms of amount of transmitting information, security and practicability.
Keywords:splitting authentication code  partially balanced t-design  restricted strongly partially balanced t-design  finite field  vector space  
点击此处可从《应用科学学报》浏览原始摘要信息
点击此处可从《应用科学学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号