Hindawi Publishing Corporation Journal of Applied Mathematics Volume 2013, Article ID 602539, 10 pages http://dx.doi.org/10.1155/2013/602539 Research Article A New Construction of Multisender Authentication Codes from Pseudosymplectic Geometry over Finite Fields Xiuli Wang College of Science, Civil Aviation University of China, Tianjin 300300, China Correspondence should be addressed to Xiuli Wang; xlwang@cauc.edu.cn Received 7 December 2012; Accepted 20 February 2013 Academic Editor: Song Cen Copyright © 2013 Xiuli Wang. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Multisender authentication codes allow a group of senders to construct an authenticated message for one receiver such that the receiver can verify authenticity of the received message. In this paper, we construct one multisender authentication code from pseudosymplectic geometry over finite fields. The parameters and the probabilities of deceptions of this code are also computed. 1. Introduction Multisender authentication code was firstly constructed by Gilbert et al. in [1] in 1974. Multisender authentication system refers to a group of senders that cooperatively send a message to the receiver, and then the receiver should be able to ascertain that the message is authentic. About this case, many scholars had also much researches and had made great contributions to multisender authentication codes [2–6]. In the actual computer network communications, multisender authentication codes include sequential model and simultaneous model. Sequential model is that each sender uses its own encoding message to the receiver, and the receiver receives the message and verifies whether the message is legal or not. Simultaneous model is that all senders use their own encoding rules to encode a source state, and each sender sends the encoded message to the synthesizer, respectively, and then the synthesizer forms an authenticated message and verifies whether the message is legal or not. In this paper, we will adopt the second model. In a simultaneous model, there are four participants: a group of senders π = {π1 , π2 , . . . , ππ }, the keys distribution center, he is responsible for the key distribution to senders and receiver, including solving the disputes between them, a receiver π , a synthesizer, he only runs the trusted synthesis algorithm. The code works as follows: each sender and receiver has their own cartesian authentication code, respectively. Let (π, πΈπ , ππ ; ππ ) (π = 1, 2, . . . , π) be the senders’ cartesian authentication code, (π, πΈπ , π; π) be the receiver’s cartesian authentication code, β : π1 × π2 × ⋅ ⋅ ⋅ × ππ → π the synthesis algorithm. ππ : πΈ → πΈπ is a subkey generation algorithm, where πΈ is the key set of the key distribution center. When authenticating a message, the senders and the receiver should comply with the protocol. The key distribution center randomly selects an encoding rule π ∈ πΈ and sends ππ = ππ (π) to the πth sender ππ (π = 1, 2, . . . , π) secretly, and then he calculates ππ by π according to an effective algorithm and secretly sends ππ to the receiver π ; if the senders would like to send a source state π to the receiver π , ππ computes π‘π = ππ (π , ππ ) (π = 1, 2, . . . , π) and sends ππ = (π , π‘π ) (π = 1, 2, . . . , π) to the synthesizer through an open channel; the synthesizer receives the message ππ = (π , π‘π ) (π = 1, 2, . . . , π) and calculates π‘ = β(π‘1 , π‘2 , . . . , π‘π ) by the synthesis algorithm β and then sends message π = (π , π‘) to the receiver π , he checks the authenticity by verifying whether π‘ = π(π , ππ ) or not. If the equality holds, the message is authentic and is accepted. Otherwise, the message is rejected. We assume that the key distribution center is credible, though he know the senders’ and receiver’s encoding rules, he will not participate in any communication activities. When transmitters and receiver are disputing, the key distribution center settles it. At the same time, we assume that the system follows Kerckhoff ’s principle in which except for the actual 2 Journal of Applied Mathematics used keys, the other information of the whole system is public. In a multisender authentication system, we assume that the whole senders are cooperating to form a valid message; that is, all senders as a whole and receiver are reliable. But there are some malicious senders which they together cheat the receiver, the part of senders and receiver are not credible, they can take impersonation attack and substitution attack. In the whole system, we assume that {π1 , π2 , . . . , ππ } are senders, π is a receiver, πΈπ is the encoding rules set of the sender ππ , and πΈπ is the decoding rules set of receiver π . If the source state space π and the key space πΈπ of receiver π are according to a uniform distribution, then the probability distribution of message space π and tag space π is determined by the probability distribution of π and πΈπ . Consider πΏ = {π1 , π2 , . . . , ππ } ⊂ {1, 2, . . . , π}, π < π, ππΏ = {π1 , π2 , . . . , ππ }, and πΈπΏ = {πΈπ1 , πΈπ2 , . . . , πΈππ }. Now, let us consider the attacks from malicious groups of senders. Here, there still are two kinds of attacks. (i) The Opponent’s Impersonation Attack. ππΏ sends a message π to receiver. ππΏ is successful if the receiver accepts it as legitimate message. Denote ππΌ (πΏ) as the largest probability of some opponent’s successful impersonation attack, and it can be expressed as ππΌ (πΏ) = max max π (π is accepted by ππΏ ∈πΈπΏ π∈π π ). ππΏ (1) (ii) The Opponent’s Substitution Attack. It is the largest probability of some opponent’s successful substitution attack, and it can be expressed as π ). ππ (πΏ) = max max σΈ max π (π is accepted by ππΏ ∈πΈπΏ π∈π π =ΜΈ π∈π π, ππΏ (2) σΈ In this paper, we give a construction about multisender authentication code from pseudosymplectic geometry over finite fields. 2. Pseudosymplectic Geometry Let πΉπ be the finite field with π elements, where π is a power of 2, π = 2] + πΏ, and πΏ = 1, 2. Let 0 πΌ(]) πΎ = ( (]) ), πΌ 0 πΎ π1 = ( πΎ π2 = ( 0 1) , 1 1 ), 1 (3) and ππΏ is a (2] + πΏ) × (2] + πΏ) nonalternate symmetric matrix. The pseudosymplectic group of degree (2] + πΏ) over πΉπ is defined to be the set of matrices ππ 2]+πΏ (πΉπ ) = {π | πππΏ π‘ π = ππΏ } denoted by ππ 2]+πΏ (πΉπ ). Let πΉπ(2]+πΏ) be the (2] + πΏ)-dimensional row vector space over πΉπ . ππ 2]+πΏ (πΉπ ) has an action on πΉπ(2]+πΏ) defined as follows: πΉπ(2]+πΏ) × ππ 2]+πΏ (πΉπ ) σ³¨→ πΉπ(2]+πΏ) , ((π₯1 , π₯2 , . . . , π₯2]+πΏ ) , π) σ³¨→ (π₯1 , π₯2 , . . . , π₯2]+πΏ ) π. (4) The vector space πΉπ(2]+πΏ) together with this group action is called the pseudosymplectic space over the finite field πΉπ of characteristic 2. Let π be an π-dimensional subspace of πΉπ(2]+πΏ) ; then, πππΏ π‘ π is cogredient to one of the following three normal forms: 0 πΌ(π ) π (π, 2π , π ) = (πΌ(π ) 0 π (π, 2π + 1, π ) = ( π (π, 2π + 2, π ) = ( 0 πΌ(π ) πΌ(π ) 0 0 πΌ(π ) πΌ(π ) 0 0(π−2π ) 1 0 1 1 1 ), ), (π−2π −1) 0 (5) ), 0(π−2π −2) for some π such that 0 ≤ π ≤ [π/2]. We say that π is a subspace of type (π, 2π + π, π , π), where π = 0, 1, or 2 and π = 0 or 1, if (i) πππΏ π‘ π is cogredient to π(π, 2π + π, π ); (ii) π2]+1 ∉ π or π2]+1 ∈ π according to π = 0 or π = 1, respectively. Let π be an π-dimensional subspace of πΉπ(2]+πΏ) . Denote by π⊥ the set of vectors which are orthogonal to every vector of π; that is, π⊥ = {π¦ ∈ πΉπ(2]+πΏ) | π¦ππΏ π‘ π₯ = 0 ∀π₯ ∈ π} . (6) Obviously, π⊥ is a (2] + πΏ − π)-dimensional subspace of πΉπ(2]+πΏ) . More properties of pseudosymplectic geometry over finite fields can be found in [7]. In [2], Desmedt et al. gave two constructions for MRAcodes based on polynomials and finite geometries, respectively. There are other constructions of multisender authentication codes which are given in [3–6]. The construction of authentication codes is of combinational design in its nature. We know that the geometry of classical groups over finite fields, including symplectic geometry, pseudosymplectic geometry, unitary geometry, and orthogonal geometry, can provide a better combination of structure and can be easy to count. In this paper, we construct one multisender authentication code from pseudosymplectic geometry over finite fields. The parameters and the probabilities of deceptions of Journal of Applied Mathematics 3 this code are also computed. We realize the generalization and application of the similar idea and method of article [8] from symplectic geometry to pseudosymplectic geometry over finite fields. 3. Construction Let Fπ be a finite field with π elements and ππ (1 ≤ π ≤ 2] + 2) the row vector in Fπ(2]+2) whose πth coordinate is 1 and all other coordinates are 0. Assume that 2 < π + 1 < π < ]. Let π = β¨π1 , π2 , . . . , ππ β©; that is, π is an π-dimensional subspace of Fπ(2]+2) generated by π1 , π2 , . . . , ππ , and then π⊥ = β¨π1 , . . . , π] , π]+π+1 , . . . , π2]+2 β©. Consider ππ = β¨π1 , . . . , ππ−1 , ππ+1 , . . . , ππ β©, 1 ≤ π ≤ π; then, ππ ⊥ = β¨π1 , . . . , π] , π]+π , π]+π+1 , . . . , π2]+2 β©. The set of source states π = {π | π is a subspace of type (2π − π + 1, 2(π − π), π − π, 1) and π ⊂ π ⊂ π⊥ }; the set of πth sender’s encoding rules πΈππ = {πππ | πππ is a subspace of type (π + 1, 0, 0, 0) and π ⊂ πππ , πππ ⊥ ππ }, 1 ≤ π ≤ π; the set of receiver’s decoding rules πΈπ ={ππ | ππ is a subspace of type (2π, 2π, π, 0) and π ⊂ ππ }; the set of πth sender’s tags ππ = {π‘π | π‘π is a subspace of type (2π−π+2, 2(π−π+1), π−π+1, 1) and π ⊂ π‘π ⊂ ππ ⊥ , π‘π ⊂ΜΈ π⊥ }; the set of receiver’s tags π = {π‘ | π‘ is a subspace of type (2π + 1, 2π, π, 1) and π ⊂ π‘}. π= ( πΌ(π) 0 π Define the encoding map ππ : π × πΈππ → ππ , ππ (π , πππ ) = π + πππ , 1 ≤ π ≤ π. The decoding map π : π × πΈπ → π, π(π , ππ ) = π + ππ . The synthesizing map β : π1 × π2 × ⋅ ⋅ ⋅ × ππ → π, β(π‘1 , π‘2 , . . . , π‘π ) = π΄(π‘1 + π‘2 + ⋅ ⋅ ⋅ + π‘π ), where π΄ is a nonsingular matrix and π΄(π‘1 + π‘2 + ⋅ ⋅ ⋅ + π‘π ) is a subspace of type (2π + 1, 2π, π, 1). The code works as follows. (1) Key Distribution. The key distribution center randomly chooses an ππ ∈ πΈπ and selects a (2π, π) subspace π such that π ⊂ π, and it selects πππ ∈ πΈππ so that ππ1 + ππ2 + ⋅ ⋅ ⋅ + πππ = π, and π΄ is a nonsingular matrix satisfying ππ = β¨π, π΄β©. The key distribution center randomly secretly sends ππ , πππ to the receiver and the senders, respectively, and sends π΄ to the synthesizer. (2) Broadcast. If the senders want to send a source state π ∈ π to the receiver π , the sender ππ calculates π‘π = ππ (π , πππ ) = π +πππ then sends π‘π (1 ≤ π ≤ π) to the synthesizer. (3) Synthesis. After the synthesizer receives π‘1 , π‘2 , . . . , π‘π , he calculates β = (π‘1 , π‘2 , . . . , π‘π ) = π΄(π‘1 + π‘2 + ⋅ ⋅ ⋅ + π‘π ) and then sends π = (π , π‘) to the receiver π . (4) Verification. When the receiver π receives π = (π , π‘), he calculates π‘σΈ = π(π , ππ ) = π + ππ . If π‘ = π‘σΈ , he accepts π‘; otherwise, he rejects it. Let 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 πΌ(π−π) π−π ]−π π π−π−1 1 π−π ]−π 1 0 ) 0 ; 1 (7) then, πΌ(π) 0 ( 0 π⊥ = 0 0 ( 0 π ( ( ⊥ ππ = ( ( πΌ(π) 0 0 0 0 0 0 π 0 0 0 πΌ(π−π) 0 0 0 0 π−π πΌ 0 (π−π) 0 0 0 0 0 π−π 0 0 0 0 0 0 π πΌ(]−π) 0 0 0 ]−π 0 0 πΌ(]−π) 0 0 0 0 ]−π 0 0 0 0 0 0 0 π 0 0 0 0 0 0 π−π−1 0 0 0 0 0 0 0 π−π−1 Lemma 1. Let πΆπ = (π, πΈππ , ππ ; ππ ); the code is a cartesian authentication code, 1 ≤ π ≤ π. 0 0 0 0 0 0 1 0 0 0 1 0 0 0 1 0 0 0 0 0 0 0 0 0 π−π 0 0 0 0 0 0 0 π−π 0 0 0 0 1 0 1 πΌ(]−π) 0 0 ]−π 0 0 0 0 πΌ(]−π) 0 0 ]−π 0 0 0 0 0 1 0 1 0 0 0) 0 , 0 1) 1 0 0 0 0 0 0 1 1 (8) ) ) ). ) Proof. For any πππ ∈ πΈππ , π ∈ π. Because πππ is a subspace of type (π + 1, 0, 0, 0) and π ⊂ πππ ⊂ π⊥ , we can assume that 4 Journal of Applied Mathematics πΌ(π) ( 0 πππ = 0 π πΌ 0 (π−π) 0 π−π 0 0 0 ]−π 0 0 0 π 0 0 0 π−π−1 Obviously, πππ ∩ π⊥ = π. Let π ∈ π; since π ⊂ π ⊂ π⊥ , π has the form as follows: πΌ(π) 0 0 0 0 0 π = ( 0 π΅2 0 π΅4 0 0) , (10) 0 0 0 1 1 0 0 0 0 0 π 8 π−π ]−π 0 0 π 9 1 0 0 ) . 0 1 (9) where π΅2 , π΅4 is a subspace of type (2(π − π), 2(π − π), π − π, 0) in the pseudosymplectic space πΉπ (2]+2) . Let π‘π = π + πππ ; then, 0 0 0 1 0 πΌ(π) 0 ( 0 π‘π = 0 0 π πΌ 0 (π−π) 0 0 0 π−π 0 0 π΅2 0 0 ]−π 0 0 0 0 0 π 0 0 0 0 0 π−π−1 πΌ(π−π) π‘π π2 π‘ π‘π ∼ ( 0 0 0 Obviously, π‘π ⊂ΜΈ π⊥ . So, π‘π is a subspace of type (2π−π+2, 2(π− π + 1), π − π + 1, 1) satisfying π ⊂ π‘π ⊂ ππ ⊥ ; that is, π‘π ∈ ππ . πΌ(π) 0 ( 0 π‘π = 0 0 π 0 πΌ(π−π) 0 0 0 π−π 0 0 π΅2 0 0 ]−π 0 0 0 0 0 π πΌ 0 0 0 0 0 1 0 1 0 (π−π) 0 0 0 0 0 π΅4 π 8 0 0 0 π−π ]−π 0 0 1 0 0 0 0 0 1 1 0 0 0) , 0 0 1 (11) 0 0) . 0 1 Furthermore, we know that π‘π ∩ π⊥ = (π + πππ ) ∩ π⊥ = π + (πππ ∩ π⊥ ) = π + π = π . Conversely, for any π‘π ∈ ππ , let π = π‘π ∩π⊥ , πΏ ⊂ π‘π , satisfying π‘π = π ⊕ πΏ. Obviously, π ⊂ π ⊂ π⊥ . For π ⊂ π‘π ⊂ ππ ⊥ , let 0 0 0 0 0 π−π−1 0 0 0 1 0 1 0 0 0 0 0 π΅4 π 8 0 0 0 π−π ]−π 0 0 0 0 1 1 0 0 0) . 0 0 1 (12) Obviously, πΌ(π) 0 ( π‘π ∩ π⊥ = 0 0 π 0 πΌ(π−π) 0 0 π−π 0 0 πΆ2 0 ]−π 0 0 0 0 π For π‘π being a subspace of type (2π−π+2, 2(π−π+1), π−π+1, 1), then π‘π ∩ π⊥ is a subspace of type (2π − π + 1, 2(π − π), π − π, 1); that is, π ∈ π. Choose πΏ = (0 0 π΅2 0 0 1 0 π΅4 0 0) . (14) 0 0 0 0 π−π−1 0 0 0 0 1 0 0 0 0 0 πΆ4 0 0 π−π ]−π 0 0 0 1 1 0 0 ) 0 . 0 1 (13) Let πππ = π+πΏ; then, πππ ∈ πΈππ , and π ⊕πΏ = π ⊕πππ . Therefore, ππ is a surjection. For any π‘π ∈ ππ , πππ ∈ πΈππ , if there exist π ∈ π so that π‘π = π +πππ ; then, π ∈ π‘π ∩π⊥ . However, dim π = 2π−π+1 = dim (π‘π ∩ π⊥ ), and so π = π‘π ∩ π⊥ ; that is, π is determined by π‘π and πππ . Journal of Applied Mathematics 5 Lemma 2. Let πΆ = (π, πΈπ , π; π); the code is a cartesian authentication code. satisfying π‘ Proof. (1) For any π ∈ π, ππ ∈ πΈπ . From the definition of π and ππ , we assume that π π π π ) π2 ( ) ( π π π2]+1 π2]+1 π π π = ( π ) 2 (π − π) , 1 π2]+1 0 (π) 0(π) 0 0 π‘ π π (π−π) 0 0 πΌ ( π ) π2 ( π ) = ( (π−π) 0 0 πΌ π2]+1 π2]+1 0 0 0 0 0 ), 0 0 (15) π π = ( π ), π2]+1 π‘ π π 0 πΌ(π) π ). ( ) π2 ( ) π2 ( ) = ( (π) π π π πΌ 0 Obviously, for any V ∈ π and V =ΜΈ 0, V ∉ π ; therefore, π π ), π‘ = π + ππ = ( π π2]+1 (16) π‘ π π π π ( ) π2 ( ) π π π2]+1 π2]+1 0 πΌ(π) =( 0 0 0 0 πΌ(π) 0 0 0 0 0 0 πΌ(π−π) (π−π) 0 0 πΌ 0 0 0 0 0 0) . 0 0 (20) Let π π ππ = ( ) , π π π‘ πΌ =( 0 0 0 0 πΌ(π) 0 0 0 0 0 0 πΌ(π−π) 0 πΌ(π−π) 0 0 0 0 0 0 0) . 0 0 (17) for π is a subspace of type (2π − π + 1, 2(π − π), π − π, 1) and π ⊂ π ⊂ π⊥ ; that is, π ∈ π is a source state. For any V ∈ π and V =ΜΈ 0, V ∉ π is obvious; that is, π ∩ π⊥ = {0}. Therefore, π π‘ ∩ π⊥ = ( π ) = π . Let ππ = ( π π ); then, ππ is receiver’s π2]+1 decoding rule satisfying π‘ = π + ππ . If π σΈ is another source state contained in π‘, then π ⊂ π σΈ ⊂ ⊥ π . Therefore, π σΈ ⊂ π‘ ∩ π⊥ = π , while dim π σΈ = dim π , and so π σΈ = π ; that is, π is the uniquely source state contained in π‘. From Lemmas 1 and 2, we know that such construction of multisender authentication codes is reasonable, and there are π senders in this system. Next, we compute the parameters of this code and the maximum probability of success in impersonation attack and substitution attack by group of senders. Lemma 3. Some parameters of this code are |π| = π (2 (π − π) , 2 (π − π) , π − π, 0; 2] + 2) ; From the above mentioned, π‘ is a subspace of type (2π + 1, 2π, π, 1) and π ⊂ π‘; that is, π‘ ∈ π. (2) For π‘ ∈ π, π‘ is a subspace of type (2π + 1, 2π, π, 1) and π ⊂ π‘; so, there is a subspace π ⊂ π‘, satisfying π‘ π 0 πΌ(π) π ). ( ) π2 ( ) = ( (π) π π πΌ 0 (21) (18) σ΅¨σ΅¨ σ΅¨σ΅¨ σ΅¨σ΅¨πΈππ σ΅¨σ΅¨ = π]−π+1 σ΅¨ σ΅¨ (1 ≤ π ≤ π) . (22) Proof. Since π ⊂ π ⊂ π⊥ , π has the following form: πΌ(π) 0 0 0 0 0 π = ( 0 π΅2 0 π΅4 0 0) , 0 0 0 0 1 0 (23) Then, we can assume that π π ) π‘=( π π2]+1 (19) where π΅2 , π΅4 is a subspace of type (2(π − π), 2(π − π), π − π, 0) in the pseudosymplectic space πΉπ (2]+2) . So, |π| = π(2(π−π), 2(π− π), π − π, 0; 2] + 2). For any πππ ∈ πΈππ , we can assume that πππ has the following form: 6 Journal of Applied Mathematics πΌ(π) ( 0 πππ = 0 π 0 πΌ(π−π) 0 π−π 0 0 π 3 ]−π 0 0 0 π 0 0 0 π−π−1 0 0 1 1 0 0 0 0 0 π 8 π−π ]−π 0 0 π 9 1 0 0 ) . π 10 1 (24) Since πππ is a subspace of type (π + 1, 0, 0, 0), so π 3 = 0 and π 10 = 0, π 8 , π 9 arbitrarily. Therefore, |πΈππ | = π]−π+1 . (2) The number of the πth sender’s tag is |ππ | = π]−π π(2(π − π), 2(π − π), π − π, 0; 2] + 2) (1 ≤ π ≤ π). Lemma 4. (1) For any π‘π ∈ ππ , the number of π‘π containing πππ is ππ−π+1 (1 ≤ π ≤ π); Proof. (1) Considering the transitivity properties of the same subspaces under the pseudosymplectic groups, we may take π‘π as follows: πΌ(π) 0 ( 0 π‘π = 0 0 ( 0 π 0 0 0 πΌ(π−π) 0 0 0 0 π−π πΌ(π−π) 0 0 0 π−π 0 0 0 0 0 0 ]−π 0 0 0 0 0 0 π 0 0 0 0 0 0 π−π−1 0 0 0 1 0 0 1 0 0 0 0 0 0 0 0 0 0 π−π πΌ(π−π) 0 π−π 0 0 0 0 0 0 ]−π 0 0 0 0 0 1 1 0 0 0 ) 0 . 0 0 ) 1 (25) twocolumngrid If πππ ⊂ π‘π , then we assume that πΌ(π) ( 0 πππ = 0 π 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 π 9 π 11 0 0 0 π 7 0 π−π π−π ]−π π π−π−1 1 π−π π−π ]−π 1 πΌ (π−π) Proof. (1) Let ππ ∈ πΈπ ; ππ has the following form: ππ = Lemma 5. (1) The number of the receiver’s decoding rules is |πΈπ | = ππ(]−π+1) . (2) For any π‘ ∈ π, the number of ππ which contained π‘ is ππ(π−π+1) (1 ≤ π ≤ π). 0 0 0 πΌ(π−π) 0 0 0 0 0 0 π−π ]−π (26) (3) The number of the receiver’s tag is |π| = ππ(]−π) π(2(π − π), 2(π − π), π − π, 0; 2] + 2). from πππ ⊥ ππ , we know that π 7 = 1, where π 9 , π 11 arbitrarily, and therefore the number of π‘π containing πππ is ππ−π+1 (1 ≤ π ≤ π). (2) We know that every π‘π contains only one source state π‘π ∩π⊥ and the number of π‘π containing πππ . Therefore, we have |π‘π | = |π||πΈππ |/ππ−π+1 = |π|π]−π+1 /ππ−π+1 = π]−π π(2(π−π), 2(π− π), π − π, 0; 2] + 2). πΌ(π) 0 ( 0 π‘= 0 0 π 0 0) ; 0 1 ( πΌ(π) 0 π 0 0 0 0 π 2 πΌ(π) π 4 π 5 ]−π π ]−π 1 0 ) π 6 . 1 (27) For ππ being a subspace of type (2π, 2π, π, 0), so π 2 and π 6 = 0; π 4 , π 5 arbitrarily. Therefore, |πΈπ | = ππ(]−π+1) . (2) Considering the transitivity properties of the same subspaces under the pseudosymplectic groups, we may choose π‘ as follows: 0 0 πΌ(π) 0 0 π 0 0 0 πΌ(π−π) 0 π−π 0 0 0 0 0 ]−π 0 0 0 0 1 1 0 0 0) . 0 0 1 (28) Journal of Applied Mathematics 7 If ππ ⊂ π‘, then ππ = ( πΌ(π) 0 π 0 0 0 0 0 0 0 π 7 0 0 πΌ(π) π 5 π−π ]−π π π−π ]−π 1 where π 5 and π 7 arbitrarily. Therefore, the number of ππ which contained π‘ is ππ(π−π+1) . (3) Similar to Lemma 4(2), |π| = |π||πΈπ |/ππ−π+1 = |π|ππ(]−π+1) /ππ−π+1 = ππ(]−π) π(2(π−π), 2(π−π), π−π, 0; 2]+2). Without loss of generality, we assume that πΏ = {π1 , π2 , . . . , ππ } ⊂ {1, 2, . . . , π}, π < π, ππΏ = {π1 , π2 , . . . , ππ }, and πΈπΏ = πΌ(π) ( 0 ππΏ = 0 π 0 0 0 πΌ 0 0 π−π ]−π (π−π) 0 ) 0 , 1 (29) {πΈπ1 , πΈπ2 , . . . , πΈππ }. Now, let us consider the attacks on π from malicious groups of senders. Lemma 6. For any ππΏ = {πΈπ1 , πΈπ2 , . . . , πΈππ } ∈ πΈπΏ , the number of ππ containing ππΏ is π(]−π+1)(π−π) . Proof. For any ππΏ = {πΈπ1 , πΈπ2 , . . . , πΈππ } ∈ πΈπΏ , we assume ππΏ to be as follows: 0 0 πΌ(π) π 0 0 0 0 0 π 6 π−π ]−π 0 0 π 7 1 0 0) . 0 1 (30) If ππ ⊃ ππΏ , then ππ has the following form: πΌ(π) 0 ( ππ = 0 0 π 0 0 0 0 0 πΌ(π−π) 0 0 πΌ(π) 0 0 0 π−π ]−π π where π 6σΈ , π 7σΈ arbitrarily. Therefore, the number of ππ containing ππΏ is π(]−π+1)(π−π) . 0 0 0 πΌ(π−π) π−π 0 0 π 6 π 6σΈ ]−π 0 0 π 7 π 7σΈ 1 0 0 ) 0 , 0 1 (31) Lemma 7. For any π‘ ∈ π and ππΏ = {πΈπ1 , πΈπ2 , . . . , πΈππ } ∈ πΈπΏ , the number of ππ which contained in π‘ and containing ππΏ is π(π−π+1)(π−π) . Proof. For any π‘ ∈ π, we assume π‘ to be as follows: ( ( π‘= ( ( πΌ(π) 0 0 0 0 0 0 π 0 πΌ(π−π) 0 0 0 0 0 π−π 0 0 πΌ(π−π) 0 0 0 0 π−π 0 0 0 0 0 0 0 ]−π 0 0 0 πΌ(π) 0 0 0 π 0 0 0 0 πΌ(π−π) 0 0 π−π πΌ 0 0 0 0 0 (π−π) 0 π−π 0 0 0 0 0 0 0 ]−π 0 0 0 0 0 0 1 1 0 0 0 0 0 0 0 1 ) ) ). (32) ) If ππΏ ⊂ π‘, then ππΏ has the following form: πΌ(π) ( 0 ππΏ = 0 π 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 πΌ(π−π) 0 0 0 0 π 7 π 9 0 πΌ(π) π−π π−π ]−π π π−π π−π ]−π 1 0 0) . 0 1 (33) 8 Journal of Applied Mathematics Since ππΏ ⊂ ππ ⊂ π‘, then we assume ππ to be as follows: πΌ(π) 0 ( 0 ππ = 0 0 π 0 0 0 πΌ(π) 0 π 0 0 0 0 0 πΌ 0 0 0 0 0 0 0 0 0 π−π π−π ]−π (π−π) where π»7 and π»9 arbitrarily. Therefore, the number of ππ which contained in π‘ and containing ππΏ is π(π−π+1)(π−π) . Lemma 8. Assume that π‘1 and π‘2 are two distinct tags (π‘1 , π‘2 ∈ π) decoded by receiver’s key ππ , and π 1 and π 2 contained in π‘1 and π‘2 are two source states, respectively. Let π 0 = π 1 ∩ π 2 , dimπ 0 = π; then, π ≤ π ≤ 2π − π, and the number of ππ which contained in π‘1 ∩ π‘2 and containing ππΏ is π(π−π)(π−1) . Proof. Since π‘1 = π 1 + ππ , π‘2 = π 2 + ππ , and π‘1 =ΜΈ π‘2 , then π 1 =ΜΈ π 2 . For any π ∈ π, π ∈ π , obviously π ≤ π ≤ 2π − π. Assume ( ( ( π‘π = ( ( ( πΌ(π) 0 0 0 0 0 0 π 0 πΌ (π−π) 0 0 0 0 0 π−π 0 0 πΌ(π−π) 0 0 0 0 π−π 0 0 0 0 0 0 0 ]−π 0 0 0 πΌ(π) 0 0 0 π 0 0 0 0 πΌ(π−π) π−π 0 0 0 0 0 0 π 7 0 0 π»7 π−π ]−π 0 0 0 π 9 π»9 1 0 0 0) , 0 0 1 (34) that π πσΈ is the complementary subspace of π 0 in the π π ; then, π π = π 0 + π πσΈ (π = 1, 2). From π‘π = π π + ππ = π 0 + π πσΈ + ππ and π π = π‘π ∩ π⊥ , we know that π 0 = (π‘1 ∩ π⊥ ) ∩ (π‘2 ∩ π⊥ ) = π‘1 ∩ π‘2 ∩ π⊥ = π 1 ∩ π‘2 = π 2 ∩ π‘1 , and π‘1 ∩ π‘2 = (π 1 + ππ ) ∩ π‘2 = (π 0 + π 1σΈ + ππ ) ∩ π‘2 = ((π 0 + ππ ) + π 1σΈ ) ∩ π‘2 , since π 0 + ππ ⊆ π‘2 ; then, π‘1 ∩ π‘2 = (π 0 + ππ ) + (π 1σΈ ∩ π‘2 ), while π 1σΈ ∩ π‘2 ⊆ π 1 ∩ π‘2 = π 0 , and so we have π‘1 ∩ π‘2 = π 0 + ππ . From the definition of π‘, we may take π‘π , π = 1, 2, as follows: 0 0 0 0 0 0 0 0 0 ππ7 0 π−π πΌ(π−π) 0 0 π−π 0 0 0 0 0 0 0 ]−π 0 0 0) ) 0) ) 0) 0 0 0 0 0 0 1 1 0 0) 1 π π−π π−π π π−π π−π 1 . (35) Let ( ( ( π‘1 ∩ π‘2 = ( ( ( πΌ(π) 0 0 0 0 0 0 π 0 πΌ (π−π) 0 0 0 0 0 π−π 0 0 πΌ(π−π) 0 0 0 0 π−π 0 0 0 0 0 0 0 ]−π 0 0 0 πΌ(π) 0 0 0 π From the above mentioned, we know that π‘1 ∩ π‘2 = π 0 + ππ , and then dim (π‘1 ∩ π‘2 ) = π + 2π − π = π + π; therefore, 0 0 0 0 πΌ(π−π) 0 0 π−π 0 0 0 0 0 π7 0 π−π 0 0 0 0 0 0 0 ]−π 0 0 0 0 0 0 1 1 0 0 0) ) 0) ) 0) 0 0) 1 π π−π π−π π π−π π−π 1 . (36) 0 π7 0 0 0 dim ( ) = π + π − (2π + π − π) = π − π. (37) 0 0 0 1 0 Journal of Applied Mathematics 9 For any ππΏ , ππ ⊂ π‘1 ∩ π‘2 , we can assume that πΌ(π) ( 0 ππΏ = 0 π πΌ(π) 0 ( ππ = 0 0 π 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 πΌ(π−π) (π) 0 0 0 π 0 π πΌ 0 7 9 π−π π−π ]−π π π−π π−π ]−π 1 0 0 0 (π−π) 0 0 πΌ 0 0 0 0 0 0 π−π π−π ]−π 0 0 πΌ(π) 0 π where every row of 0 0 0 πΌ(π−π) π−π 0 0 0 0 π 7 0 0 π»7 π−π ]−π 0 π 0 ) π−π , 0 π 1 0 0 π 9 π»9 1 0 0 ) 0 0 1 π π−π , π π−π (38) receiver accepts it as legitimate message. So, ππ (πΏ) (0 π»7 0 π»9 0) (39) is the linear combination of the base of σ΅¨σ΅¨ σ΅¨ σ΅¨σ΅¨{ππ ∈ πΈπ | ππ ⊂ π‘, π‘σΈ and ππΏ ⊂ ππ }σ΅¨σ΅¨σ΅¨ σ΅¨ σ΅¨ = max max σΈ max { σ΅¨σ΅¨ σ΅¨ } ππΏ ∈πΈπΏ π∈π π =ΜΈ π∈π σ΅¨σ΅¨{ππ ∈ πΈπ | ππ ⊂ π‘ and ππΏ ⊂ ππ }σ΅¨σ΅¨σ΅¨ π(π−π)(π−π) π≤π≤2π−π π(π−π)(π−π+1) 1 = max (2π−π+1−π)(π−π) π≤π≤2π−π π 1 = (π−π) . π = max 0 π7 0 0 0 ( ). 0 0 0 1 0 (40) Therefore, the number of ππ ⊂ π‘1 ∩ π‘2 and containing ππΏ is π(π−π)(π−π) . Theorem 9. In the constructed multisender authentication codes, the largest probabilities of success for impersonation attack and substitution attack from ππΏ on a receiver π are ππΌ (πΏ) = 1 π(]−π)(π−π) , ππ (πΏ) = 1 π2(π−π) , (41) Acknowledgments This work is supported by the NSF of China (61179026) and Fundamental Research of the Central Universities of China Civil Aviation University of Science special (ZXH2012k003). References respectively. Proof. Impersonation Attack. ππΏ , after receiving his secret keys, encodes a message and sends it to receiver. ππΏ is successful if the receiver accepts it as legitimate message. So, ππΌ (πΏ) σ΅¨ σ΅¨σ΅¨ σ΅¨{π ∈ πΈ | π ⊂ ππ and ππ ⊂ π‘}σ΅¨σ΅¨σ΅¨ } = max max { σ΅¨ π σ΅¨σ΅¨ π πΏ σ΅¨ ππΏ ∈πΈπΏ π∈π σ΅¨σ΅¨{ππ ∈ πΈπ | ππΏ ⊂ ππ }σ΅¨σ΅¨σ΅¨ π(π−π)(π−π+1) 1 = (π−π)(]−π+1) = (]−π)(π−π) . π π (43) (42) Substitution Attack. ππΏ replaces π‘ with another message π‘σΈ , after it observes a legitimate message π‘. ππΏ is successful if the [1] E. N. Gilbert, F. J. MacWilliams, and N. J. A. Sloane, “Codes which detect deception,” The Bell System Technical Journal, vol. 53, pp. 405–424, 1974. [2] Y. Desmedt, Y. Frankel, and M. Yung, “Multi-receiver/multisender network security: efficient authenticated multicast/feedback,” in Proceedings of the the 11th Annual Conference of the IEEE Computer and Communications Societies (Infocom ’92), pp. 2045–2054, May 1992. [3] K. Martin and R. Safavi-Naini, “Multi-sender authentication schemes with unconditional security,” in Information and Communications Security, vol. 1334 of Lecture Notes in Computer Science, pp. 130–143, Springer, Berlin, Germany, 1997. [4] W. Ma and X. Wang, “Several new constructions of multitrasmitters authentication codes,” Acta Electronica Sinica, vol. 28, no. 4, pp. 117–119, 2000. [5] G. J. Simmons, “Message authentication with arbitration of transmitter/receiver disputes,” in Proceedings of the 6th Annual 10 International Conference on Theory and Application of Cryptographic Techniques (Eurcrypt ’87), vol. 304 of Lecture Notes in Computer Science, pp. 151–165, 1987. [6] C. Shangdi and C. Lizhen, “Two constructions of multi-sender authentication codes with arbitration based linear codes,” WSEAS Transactions on Mathematics, vol. 11, no. 12, 2012. [7] Z. Wan, Geometry of Classical Groups over Finite Fields, Science Press, Beijing, China, 2nd edition, 2002. [8] C. Shangdi and Z. Dawei, “Two constructions of multireceiver authentication codes from symplectic geometry over finite fields,” Ars Combinatoria, vol. 99, pp. 193–203, 2011. Journal of Applied Mathematics Advances in Operations Research Hindawi Publishing Corporation http://www.hindawi.com Volume 2014 Advances in Decision Sciences Hindawi Publishing Corporation http://www.hindawi.com Volume 2014 Mathematical Problems in Engineering Hindawi Publishing Corporation http://www.hindawi.com Volume 2014 Journal of Algebra Hindawi Publishing Corporation http://www.hindawi.com Probability and Statistics Volume 2014 The Scientific World Journal Hindawi Publishing Corporation http://www.hindawi.com Hindawi Publishing Corporation http://www.hindawi.com Volume 2014 International Journal of Differential Equations Hindawi Publishing Corporation http://www.hindawi.com Volume 2014 Volume 2014 Submit your manuscripts at http://www.hindawi.com International Journal of Advances in Combinatorics Hindawi Publishing Corporation http://www.hindawi.com Mathematical Physics Hindawi Publishing Corporation http://www.hindawi.com Volume 2014 Journal of Complex Analysis Hindawi Publishing Corporation http://www.hindawi.com Volume 2014 International Journal of Mathematics and Mathematical Sciences Journal of Hindawi Publishing Corporation http://www.hindawi.com Stochastic Analysis Abstract and Applied Analysis Hindawi Publishing Corporation http://www.hindawi.com Hindawi Publishing Corporation http://www.hindawi.com International Journal of Mathematics Volume 2014 Volume 2014 Discrete Dynamics in Nature and Society Volume 2014 Volume 2014 Journal of Journal of Discrete Mathematics Journal of Volume 2014 Hindawi Publishing Corporation http://www.hindawi.com Applied Mathematics Journal of Function Spaces Hindawi Publishing Corporation http://www.hindawi.com Volume 2014 Hindawi Publishing Corporation http://www.hindawi.com Volume 2014 Hindawi Publishing Corporation http://www.hindawi.com Volume 2014 Optimization Hindawi Publishing Corporation http://www.hindawi.com Volume 2014 Hindawi Publishing Corporation http://www.hindawi.com Volume 2014