期刊文献+

关于CARTESIAN认证码的构造 被引量:5

On The Construction of Cartesian Authentication Codes
下载PDF
导出
摘要 本文用初等方法构造了几类使对手模仿和替换攻击成功的概率都达到最小,且编码规则数也达到最小的认证码;同时也构造了使对手模仿和替换攻击成功的概率都达到最小,且编码规则也达到最小,源状态数达到最多的最佳认证码.并给出一种在不增加编码规则数量的情况下,将Cartesian认证码改造成完备安全(Perfectsecrecy)认证码的方法. Several classes of authentication codes with the lowest probabilities of successful impersonation and substitution attack and the smallest encoding rules are constructed,and also authentication code with the lowest probabilities of successfully impersonation and substitution attack and the smallest encoding rules and the largest source states is constructed by elementary methods.A new modified method of restructuring Cartesian authentication codes into perfect secret authentication code is given and the quantity of encoding rules of the modified scheme is the same as original scheme.
出处 《电子学报》 EI CAS CSCD 北大核心 1999年第5期33-35,共3页 Acta Electronica Sinica
基金 国家自然科学基金 博士点基金
关键词 CARTESIAN 认证码 安全认证码 编码规则 Cartesian authentication codes,Secret authentication codes,Encoding rules
  • 相关文献

同被引文献26

  • 1赵友蕙.构作正交空间中的一类Cartesian认证码[J].数学的实践与认识,2005,35(8):188-193. 被引量:2
  • 2刘金龙,许宗泽.两类Cartesian认证码的构造[J].西安电子科技大学学报,2007,34(3):505-508. 被引量:1
  • 3Simmons G.Authentication theory/coding theory[C]//Lecture Note in Computer Science 196:Advances in Cryptology Proc of Crypt84.[S.l.] : Springer, 1985 : 411-431.
  • 4Wan Z,Construetion of Cartesian authentication codes from unitary geometry[J].Design, Codes and Cryptology, 1992,2(4): 333-356.
  • 5You Hong, Nan Ji-zhu.Using normal form of matrices over finite fields to construct Cartesian authentication codes[J].Joumal of Mathematical Research & Exposition, 1998,18 (3) : 341-346.
  • 6Wan Z.Geometry of classical groups over finite fields[M].Sweden:Lund Studenlitteratur, 1993.
  • 7刘金龙,许宗泽.利用Cartesian认证码构造安全认证码[J].电子与信息学报,2007,29(8):2026-2028. 被引量:1
  • 8北京大学数学力学系概率统计组编.正交设计法[M].北京:化学工业出版社,1979..
  • 9Simmons G J.Authentication theory/coding theory,Advances in Cryptology.In:Proc.Crypto'84.Berlin:Springer-Verlag,1984:411-431.
  • 10Stinson D R.Construction for authentication/secrecy codes from certain combinatorial designs.Journal of Cryptology,1988,1(2):119-127.

引证文献5

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部