Constructions of authentication codes from algebraic curves over finite fields

We present a new application of algebraic curves over finite fields to the constructions of universal hash families and unconditionally secure codes. We show that the constructions derived from the Garcia-Stichtenoth curves yield new classes of authentication codes and universal hash families which are substantially better than those previously known.

[1]  Henning Stichtenoth,et al.  Algebraic function fields and codes , 1993, Universitext.

[2]  Douglas R. Stinson,et al.  Combinatorial Characterizations of Authentication Codes II , 1992, Des. Codes Cryptogr..

[3]  Thomas Johansson,et al.  On the cardinality of systematic authentication codes via error-correcting codes , 1996, IEEE Trans. Inf. Theory.

[4]  Thomas Johansson,et al.  Contributions to unconditionally secure authentication , 1994 .

[5]  Larry Carter,et al.  Universal Classes of Hash Functions , 1979, J. Comput. Syst. Sci..

[6]  H. Stichtenoth,et al.  On the Asymptotic Behaviour of Some Towers of Function Fields over Finite Fields , 1996 .

[7]  Douglas R. Stinson,et al.  On the Connections Between Universal Hashing, Combinatorial Designs and Error-Correcting Codes , 1995, Electron. Colloquium Comput. Complex..

[8]  Thomas Johansson,et al.  On Families of Hash Functions via Geometric Codes and Concatenation , 1993, CRYPTO.

[9]  Gustavus J. Simmons,et al.  A survey of information authentication , 1988, Proc. IEEE.

[10]  W. Waterhouse,et al.  Abelian varieties over finite fields , 1969 .

[11]  S. Hansen Rational Points on Curves over Finite Fields , 1995 .

[12]  Jürgen Bierbrauer,et al.  Universal Hashing and Geometric Codes , 1997, Des. Codes Cryptogr..

[13]  Tor Helleseth,et al.  Universal Hash Functions from Exponential Sums over Finite Fields and Galois Rings , 1996, CRYPTO.

[14]  S. G. Vladut,et al.  Algebraic-Geometric Codes , 1991 .

[15]  Douglas R. Stinson,et al.  Universal hashing and authentication codes , 1991, Des. Codes Cryptogr..

[16]  Larry Carter,et al.  New Hash Functions and Their Use in Authentication and Set Equality , 1981, J. Comput. Syst. Sci..

[17]  Gustavus J. Simmons,et al.  Authentication Theory/Coding Theory , 1985, CRYPTO.

[18]  F. MacWilliams,et al.  Codes which detect deception , 1974 .