期刊文献+

有仲裁人认证码的信息论下界 被引量:4

Information Theoretic Lower Bounds for Authentication Codes with Arbiter
下载PDF
导出
摘要 在Simmons给出的有仲裁人认证码中,主要研究了五种欺骗攻击.Johnson对这些欺骗成功概率的信息论下界进行了研究.本文则给出了有仲裁人认证码中的敌方和收方的i(0)阶欺骗攻击成功概率的信息论下界,完善了关于欺骗攻击成功概率的下界的研究. In the authentication codes with arbiter introduced by Simmons.five cheating attacks were mainly explored.The informationtheoretic lower bounds for the probability of successful deception for the five cheating attacks were obtained by Johnsson.In this paper,the information theoretic lower bounds for the probability of successful deception for spoofing attacks of order i by opponent and receiver are obtained.So the lower bounds for the probability of successful deception are perfected.
出处 《电子学报》 EI CAS CSCD 北大核心 1999年第4期90-93,97,共5页 Acta Electronica Sinica
基金 国家自然基金 863项目资助
关键词 认证码 认证函数 有仲裁人认证码 i阶欺骗攻击 Authentication code,Authentication function,Spoofing attack of order i ,Authentication code with arbiter
  • 相关文献

参考文献1

  • 1Ding Yipei,J Cryptology,1995年,8卷,177页

同被引文献17

  • 1李志慧,李瑞虎.利用伪辛几何构作带仲裁的认证码[J].兰州大学学报(自然科学版),2005,41(5):123-126. 被引量:10
  • 2郭军.利用有限仿射几何构作带仲裁的认证码[J].高师理科学刊,2007,27(1):1-4. 被引量:1
  • 3Tonelih H Wang,Chih-Hung Wang.Arbitrated authentication schemes with multi-sender [C].In: Advances in Crypto-Crpto'97,Springer-Verlag, 1997: 266-272
  • 4K Kurosawa.New bound on authentication code with arbitration[C].In:Proceeding of CRYPTO' 94, LNCS,Springer-Verlag, 1994;839: 140-149
  • 5Y Desemedt.Society and group riented cryptograph:a new concept[C].In: Advances in cryptology -Crpto' 87, LNCS, Springer -Verlag, 1987;576: 457-469
  • 6D R Stinson.Universal hashing and authentication codes[J].Designs,Codes and Cryptograph, 1994;4:369-380
  • 7Pete Gemme11, Moni Naor.Codes for interactive authentication [C].In :Advances in Cryptolog-Crrypto' 93, LNCS, Springer-Verlag, 1994: 773:355-367
  • 8Simmons G A. Cartesian product construction for unconditionally secure authentication codes that permit arbitration. J. Cryptology, 1990; (2): 77 - 104.
  • 9JohansonT. Lower bounds on the probability of deception in authenti cation with arbitration. IEEE Trans Inform Theory, 1994; 40(5): 1573 - 1585.
  • 10Atiti M, Stinson D R. Universal hashing rand multiple authentication. Advances in Cryp tology - Crypto 96,1996:1109:16 -30.

引证文献4

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部