期刊文献+

多重保密和对抗多阶欺骗的认证码构造

Construction of Authentication Codes with Multi-Fold Secrecy and Capacity to Defend Multi-Fold Deception
下载PDF
导出
摘要 为了充分发挥消息认证系统的安全性能,采用排列组合的方法首次构造了一类具有多重信源保密能力同时可以对抗多阶欺骗的认证码,并计算了该码的参数以及当信源和编码规则等概率选取时的各种攻击成功的概率。同时,本文也对认证码的密钥传输效率进行了分析,并在此基础上提出了一种密钥长度压缩算法。 A construction of authentication code with multi-fold secrecy and capacity to defend multi-fold deception is given and the parameters of the code are computed.Under the assumption that the information sources and the encoding rules are chosen according to a uniform probability distribution,the probabilities of all successful attacks are also computed.Moreover,in order to improve transmission efficiency of the authentication code,an effective key-length compression algorithm is proposed.
出处 《南京邮电大学学报(自然科学版)》 2011年第1期65-69,共5页 Journal of Nanjing University of Posts and Telecommunications:Natural Science Edition
基金 江苏省博士后科研资助计划(0902055C)资助项目
关键词 CARTESIAN认证码 保密认证码 排列组合 cartesian authentication codes secret authentication codes permutations and combinations
  • 相关文献

参考文献12

  • 1SIMMONS G J. Authentication theory/coding theory [ C ] //BLAKLEY G R, CHAUM D. Advances in Cryptology: Proceedings of CRYPTO 84, LNCS 196. Berlin : Springer, 1984 : 411 - 431.
  • 20ZBUDAK F, SAYGI Z. Systematic authentication codes using additive polynomials [ J ]. Des Codes Cryptogr,2008,49 : 61 - 77.
  • 3DING C S, TIAN X J. Three constructions of authentication codes with perfect secrecy [ J ]. Designs, Codes and Cryptography, 2004, 33:227 - 239.
  • 4GAO You,WU Jianguang. Construction of Cartesian authentication codes over symplectic spaces [ J ]. JP Journal of Algebra, Number Theory and Applications,2009,13 ( 2 ) : 171 - 183.
  • 5刘金龙,许宗泽.笛卡尔积与认证码[J].电子与信息学报,2008,30(6):1441-1444. 被引量:4
  • 6DING Cunsheng,SALOMAA A,SOLE P,et al. Three constructions of authentication/secrecy codes[ C ]//FOSSORIER M, HOEHOLDT T,POLI A. AAECC2003, LNCS 2643. Berlin: Springer, 2003:24 -33.
  • 7MCAVEN L,NAINI R S,YUNG M. Symmetric authentication codes with secrecy and unconditionally secure authenticated encryption [ C] //CANTEAUT A, VISWANATHAN K. INDOCRYPT 2004, LNCS 3348. Bedin :Springer,2004 : 148 - 161.
  • 8赵友蕙.利用结合方案构作完全保密的认证码[J].首都师范大学学报(自然科学版),2007,28(4):8-11. 被引量:1
  • 9DODIS Y, PIETRZAK K. Improving the Security of MACs Via Ran- domized Message Preprocessing[ J]. Lecture Notes in Computer Science ,2007,4593:414 -433.
  • 10BHAUMIK J,CHOWDHURY D R. An Integrated ECCMAC Based on RS Code [ J ]. Lecture Notes in Computer Science,2009,5430 : 117 - 135.

二级参考文献9

  • 1Gilbert E N, MacWilliams F J, and Stoane N J A. Codes which detect deception. The Bell System Technical Journal, 1974, 53(3): 405-424.
  • 2Simmons G J. Authentication theory/coding theory,Advances in Cryptology. In: Proc. Crypto'84. Berlin: Springer-Verlag, 1984: 411-431.
  • 3Wan Zhexian. Further constructions of Cartesian authentication codes from symplectic geometry. Northeaster Mathematical Journal, 1992, 8(1): 4-20.
  • 4Pei Dingyi. A problem of combinatorial designs related to authentication codes. Journal of Combinatorial Designs, 1998, 6(6): 417-429.
  • 5Stinson D R. Combinatorial characterizations of authentication codes. Designs, Codes and Cryptography, 1992, 2(2): 175-187.
  • 6Pei Dingyi. A problem of combinatorial designs related to authentication codes. Journal of Combinatorial Design, 1998, 6: 417-429.
  • 7FENG Rong quan (School of Mathematical Sciences, Peking University, Beijing 100871, China).EXISTENCE OF AUTHENTICATION CODES[J].Systems Science and Mathematical Sciences,2000,13(1):108-112. 被引量:3
  • 8胡磊,裴定一.各阶欺骗概率相等的最优认证码[J].应用数学学报,2002,25(1):43-48. 被引量:1
  • 9冯荣权.利用有限域上正交几何中一类2维子空间构作PBIB设计[J].河北师范学院学报(自然科学版),1992(1):26-39. 被引量:1

共引文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部