This is a form of what this Bernstein paper calls an (unprotected) counter sum. It is not a secure MAC, it is vulnerable to a simple attack (and I'll use 1-based indexing, unlike your question's 0-based indexes):
- Adversary chooses a one-block message $x$ and queries for its tag; gets back $t_1 = f(1, x)$.
- Adversary chooses a one-block message $x'$ (distinct from $x$) and queries for its tag; gets back $t_2 = f(1, x')$.
- Adversary computes the difference of the two tags: $d = t_1 \oplus t_2$.
- Adversary chooses a block $y$ and queries for the tag of $x \mathbin\Vert y$; gets back $t_3 = f(1, x) \oplus f(2, y)$.
- Adversary guesses that the tag of $x' \mathbin\Vert y$ is $t_4 = t_3 \oplus d$.
The reasoning is that the difference between the tags of $x$ and $x'$ has got to be the same as that between the tags of $x \mathbin\Vert y$ and $x' \mathbin\Vert y$:
$$
\begin{align}
d &= t_1 \oplus t_2 \\
d &= f(1, x) \oplus f(1, x') \\
d \oplus t_3 &= f(1, x) \oplus f(1, x') \oplus t_3 \\
d \oplus t_3 &= f(1, x) \oplus f(1, x') \oplus f(1, x) \oplus f(2, y) \\
d \oplus t_3 &= f(1, x') \oplus f(2, y) \\
d \oplus t_3 &= t_4
\end{align}
$$
A simple solution is to compute a protected counter sum, like Bernstein's paper describes:
$$
f'(x_1, \dots, x_n) = f(0, f(1, x_1) \oplus \cdots \oplus f(n, x_n))
$$
The outer, zero-indexed application of $f$ "protects" the output of the XOR from the attack above.
EDIT: @Melab has highlighted that I seem to have misinterpreted the last sentence in the question:
If the authentication tag is derived from $\alpha$ and $K$ in some way that uses the same function used to in deriving $y_{i}$, then would this be a secure authentication algorithm?
The problem here is when you say "some way," because it's not clear whether you mean to ask whether there exists some way that will yield a secure MAC, or whether your construction is secure given any way of using the same function. The answer is "yes" for the former, "no" for the latter.