期刊文献+

强分裂系统码

Strongly Splitting Systematic Authentication Codes
下载PDF
导出
摘要 从分裂认证码出发,构造一种新的强系统认证码.利用这种特殊的码与一般系统认证码的关系,得到这种码的最大模仿概率PIS*的下界公式;另外,进一步探讨ci(i=1,2,…,k)固定的(c1,c2,…,ck)型强分裂系统码的PSI*的下界公式,并且给出把已知的(c1,c2,…,ck)型强分裂系统码转变到PIS*最小的(c1,c2,…,ck)型强分裂系统码方法. From the splitting systematic authentication codes, a new kind of codes that is strongly splitting systematic authentication codes is constructed. By studying relation between this special codes and general systematic authentication codes, a low bound of maximum probabilities of a successful impersonation P1^S for all those codes is derived if encoding rule distributions are equiprobable. Moreover, we seek the low bound P1^S of ( c1,c2,…,ck) style strongly splitting systematic authentication codes ci(i=1,2,…,k), and turn a given (c1,c2,…,ck) style strongly splitting systematic authentication codes into the same style of codes having minimal p1^S.
机构地区 上海大学理学院
出处 《上海大学学报(自然科学版)》 CAS CSCD 北大核心 2009年第3期265-271,共7页 Journal of Shanghai University:Natural Science Edition
关键词 强分裂系统码 局部平衡化 相互平衡化 strongly splitting systematic authentication codes local uniformization mutual uniformization
  • 相关文献

参考文献6

  • 1SIMMONS G J.Authentication theory/coding theory[J].Lecture Notes in Computer Science,1985,196:411-432.
  • 2DE SOETE M.New bounds and constructions for authentication/secrecy codes with splitting[J].Journal of Cryptology,1991,3:173-186.
  • 3JOHNANSSON T.Further results on asymmetric authentication schemes[J].Information and Computation,1999,151(1/2):100-133.
  • 4OGATA W,KUROSAWA K,STINSON D R,et al.New combinatorial designs and their aptications to authentication codes and secret sharing schemes[J].Discrete Mathematics,2004,279:383-405.
  • 5杨建生,齐韬.认证码的平衡化方法[J].上海大学学报(自然科学版),2006,12(2):170-173. 被引量:2
  • 6杨建生,徐雯.分裂认证码的平衡化方法[D].上海:上海大学,2007.

二级参考文献7

  • 1SIMMONS G J.Authentication theory /coding theory[J].Lecture Notes in Computer Science,1985,196:411-432.
  • 2SIMMONS G J.The practice of authentication[J].Lecture Notes in Computer Science,1986,219:261-272.
  • 3STINSON D R.Some constructions and bounds for authentication codes[J].Journal of Cryptology,1988,1:37-51.
  • 4DE SOETE M.New bounds and constructions for authentication/secrecy codes with splitting[J].Journal of Cryptology,1991,3:173-186.
  • 5STINSON D R.Combinatorial characterizations of authentication codes[J].Designs,Codes and Cryptography,1992,2:175-187.
  • 6REES R S,STINSON D R.Combinatorial characterizations of authentication codes Ⅱ[J].Designs,Codes and Cryptography,1996,7:239-259.
  • 7KUROSAWA K,OKADA K,SAIDO H,et al.New combinatorial bounds for authentication codes and key predistribution schemes[J].Designs,Codes and Cryptography,1998,15:87-100.

共引文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部