期刊文献+

利用结合方案构作完全保密的认证码 被引量:1

A Construction of Authentication codes with perfect Secrecy from Association Schemes
下载PDF
导出
摘要 利用结合方案构作出一类完全保密的认证码,计算了认证码的参数,并假定按照等概率分布选择编码规则,计算了成功模仿攻击概率和成功替换攻击概率.进一步地,在由一种典型群上的几何构作的结合方案上具体得到一类完全保密的认证码.  In the present paper a construction of authentication codes with perfect secrecy from association schemes are presented.The size parameters of the codes so constructed are computed.On assuming that encoding rules are chosen according to a uniform probability distribution,the probabilities of a successful impersonation attack and a successful substitution attack of these codes are also computed respectively.Morecover,some authentication codes with perfect secrecy from association schemes,which are constructed from Geometry of Classical Groups,are given.
作者 赵友蕙
出处 《首都师范大学学报(自然科学版)》 2007年第4期8-11,共4页 Journal of Capital Normal University:Natural Science Edition
关键词 认证码 结合方案 典型群. authentication code,association scheme,classical group
  • 相关文献

参考文献2

共引文献2

同被引文献11

  • 1SIMMONS G J. Authentication theory/coding theory [ C ] //BLAKLEY G R, CHAUM D. Advances in Cryptology: Proceedings of CRYPTO 84, LNCS 196. Berlin : Springer, 1984 : 411 - 431.
  • 20ZBUDAK F, SAYGI Z. Systematic authentication codes using additive polynomials [ J ]. Des Codes Cryptogr,2008,49 : 61 - 77.
  • 3DING C S, TIAN X J. Three constructions of authentication codes with perfect secrecy [ J ]. Designs, Codes and Cryptography, 2004, 33:227 - 239.
  • 4GAO You,WU Jianguang. Construction of Cartesian authentication codes over symplectic spaces [ J ]. JP Journal of Algebra, Number Theory and Applications,2009,13 ( 2 ) : 171 - 183.
  • 5DING Cunsheng,SALOMAA A,SOLE P,et al. Three constructions of authentication/secrecy codes[ C ]//FOSSORIER M, HOEHOLDT T,POLI A. AAECC2003, LNCS 2643. Berlin: Springer, 2003:24 -33.
  • 6MCAVEN L,NAINI R S,YUNG M. Symmetric authentication codes with secrecy and unconditionally secure authenticated encryption [ C] //CANTEAUT A, VISWANATHAN K. INDOCRYPT 2004, LNCS 3348. Bedin :Springer,2004 : 148 - 161.
  • 7DODIS Y, PIETRZAK K. Improving the Security of MACs Via Ran- domized Message Preprocessing[ J]. Lecture Notes in Computer Science ,2007,4593:414 -433.
  • 8BHAUMIK J,CHOWDHURY D R. An Integrated ECCMAC Based on RS Code [ J ]. Lecture Notes in Computer Science,2009,5430 : 117 - 135.
  • 9ZNAIDI W, MINIER M, LAURADOUX C. Aggregated Authentication (AMAC) Using Universal Hash Functions [ J ]. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Tele- communications Engineering,2009,19 : 248 - 264.
  • 10PEI Dingyi. New family of nonCartesian perfect authentication codes[ C ] // IWCC 2009, LNCS 5557. Berlin : Springer, 2009 : 188 - 201.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部