Abstract This paper discusses the bounds on the probability of success in impersonation and substitution attack by malicious groups of receivers for multiple authentication codes with multi-receiver, and gives out the least-size of the secret key space that the sender and the receivers must have in hand to ensure the multiple authertication codes with multi-receiver being under security level and presents also its construting method.