Authentication codes and bipartite graphs

  • Authors:
  • Rongquan Feng;Lei Hu;Jin Ho Kwak

  • Affiliations:
  • LMAM, School of Mathematical Sciences, Peking University, Beijing 100871, PR China;State Key Laboratory of Information Security, (Graduate School of Chinese Academy of Sciences), Beijing 100039, PR China;Mathematics, Pohang University of Science and Technology, Pohang 790-784, Republic of Korea

  • Venue:
  • European Journal of Combinatorics
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper, a characterization of authentication codes in terms of bipartite graphs is given. By using such a characterization, two necessary and sufficient conditions for a minimal authentication code with perfect secrecy are derived. The probabilities of a successful impersonation and of a successful substitution attack are discussed. As a result, some (optimal) minimal authentication codes with perfect secrecy are constructed from association schemes, from finite groups or from known authentication codes no matter whether the known ones are with or without secrecy.