期刊文献+

由PG(3,q)构造的一类Cartesian认证码

A Class of Cartesian Athentication Codes from PG(3,q)
下载PDF
导出
摘要 设P为域GF(q)上的3维射影空间PG(3,q)中的一个点,L是PG(3,q)中过P的一条线。取包含L的平面组成的集合为信源集S,与L的交为{P}的平面组成的集合为编码规则集E,与L的交为{P}的线组成的集合为信息集M。对任意π1∈S,π2∈E,定义f(π1,π2)=π1∩π2,得到一类Cartesian认证码,并计算了这个码的参数。假设编码规则按照一种均匀概率分布被选取,则成功模仿攻击的概率PI和成功替换攻击的概率PS也被计算。 Let P be a point in projective space PG(3,q) over GF(q),L be a line through P in PG(3,q).Let S be the source set composed of planes through L,E be the encode rules set composed of planes which intersect with L at P,M be the message set composed of lines which intersect with L at P.For any π1∈S,π2∈E,define f(π1,π2)=π1∩π2,we have a class of Cartesian authentication codes.We compute the parameters of these codes.Assume that the encoding rules are chosen according to a uniform probability distribution,the largest probabilities of a successful impersonation attack PI and the largest probabilities of a successful substitution attack PS of these codes are also computed.
作者 李秀丽
出处 《青岛科技大学学报(自然科学版)》 CAS 2010年第6期650-652,共3页 Journal of Qingdao University of Science and Technology:Natural Science Edition
基金 国家自然科学基金项目(10971252)
关键词 射影空间 CARTESIAN认证码 信源 编码规则 信息 projective space Cartesian authentication codes source encoding rules message
  • 相关文献

参考文献5

二级参考文献26

  • 1周智,胡正名.由传统认证码(A-CODE)构造有仲裁人的认证码(A^2-CODE)[J].电子科学学刊,1997,19(4):489-493. 被引量:5
  • 2Wan Z,IEEE Trans Information Theory,1994年,40卷,3期,920页
  • 3Wan Z,Lund: Student Litteratur,1993年
  • 4北京大学数学力学系概率统计组编.正交设计法[M].北京:化学工业出版社,1979..
  • 5SIMMONS G J. Message Authentication with Arbitration of Transmitter/Receiver Disputes [ A]. CHAUM D, PRICE W L. Proc Eurocrypt'87 [C]. Berlin:Springer-verlag, 1988.151-165.
  • 6WAN Zhe-xian, Futher Construction of Cartesion Authentication Codes from Symplectic Geometry [J], North-eastern Mathematical Journal, 1992 (8) : 4-20,
  • 7WAN Zhe-xian. Geometry of Classical Groups over Finite Fields [ M]. Sweden:Lund Student Litteratur, 1993.
  • 8Gilbert E N, MacWilliams F J, and Stoane N J A.Codes which detect deception. The Bell System Technical Journal, 1974, 53(3): 405-424.
  • 9Simmons G J. Authentication theory/coding theory. Advances in Cryptology, In: Proc.-Cryto'84, Berlin, Springer- Verlag, 1984: 411-431.
  • 10Brickell E F, and Stinson D R. Authentication codes with multiple arbiters. Advances in Cryptology, In: Proc. Eurocrypt'88, Berlin, Springer-Verlag, 1988: 51-55.

共引文献26

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部