期刊文献+

利用有限域上二元多项式构造带仲裁的认证码

Construction of Authentication Codes with Arbitration from Binary Polynomials over Finite Field
下载PDF
导出
摘要 在传统的无条件安全认证码中,假定发方和收方是相互信任的,他们不会互相欺骗。但有些情况也可能不是这样,发方在发出一个消息后,不承认是他发的,收方捏造了一个消息,声称来自发方,在这种情况下就需要增添仲裁方。带仲裁的认证码能解决通信系统中发方与收方互不信任的问题。利用有限域上二元多项式构造了一个带仲裁的认证码,并计算了所构造码的参数。当编码规则按等概率分布选取时,计算出了敌方与收方成功模仿攻击和成功替换攻击的最大概率,以及发方成功模仿攻击的最大概率。 It is assumed that the transmitter and the receiver trust each other and they do not cheat in a traditional unconditionally secure authentication code. But it is not always like this,a transmitter may deny sending a message which he actually sent and a receiver may try to construct a fraulent message on behalf of the transmitter,in this case,an arbiter is needed in the situations just mentioned. Authentication codes with arbitration can solve the problem that the transmitter and the receiver distrust with each other in the correspondence system. An authentication code with arbitration from binary polynomials over finite fields is given and their parameters are computed. Assuming that the encoding rules chosen according to a uniform probability distribution,the probabilities of a successful impersonation and a successful substitution by the opponent,a successful impersonation by the transmitter,a successful impersonation and a successful substitution by the receiver are also computed.
作者 陈尚弟 安蕾
出处 《中国民航大学学报》 CAS 2011年第5期55-59,共5页 Journal of Civil Aviation University of China
基金 天津市自然科学基金项目(08JGYBJ13900) 中央高校基本业务费(ZXH2010C008)
关键词 有限域 多项式 带仲裁的认证码 finite field polynomial authentication code with arbitration
  • 相关文献

参考文献11

  • 1SIMMONS G J. Message Authentication with Arbitration of Transmitter/ Receiver Disputes[C]//Proc Eurcrypt 87. Lecture Notes in Computer Science, Berlin : Spring-Verlag, 1987 (304) : 151-165.
  • 2高有,石新华,王红丽.利用有限域上奇异辛几何构造具有仲裁的认证码[J].南开大学学报(自然科学版),2008,41(6):72-77. 被引量:4
  • 3WAN ZHEXIAN. Construction of cartesian authentication codes from unitary geometry[J]. Designs, Codes and cryptology, 1992,2: 333-356.
  • 4李瑞虎,李尊贤.利用辛几何构作的几类A^2-码(Ⅰ)[J].陕西师大学报(自然科学版),1998,26(2):12-16. 被引量:1
  • 5CHEN SHANGDI,ZHAO DAWEI. New construction of authentication codes with arbitration from pseudo-sympletic geometry over finite fields [J]. ARS Combinatoria, 2010,97A :453-465.
  • 6GAO YOU,WANG HONGLI. Construction of Authentication Codes with Arbitration from Singular Pseudo-Sympletic Geometry [C]//Machine Learning and Cybernetics, 2008 International Conference on 08/ 2008,2:1183-1188.
  • 7马文平,王新梅.基于辛空间的具有仲裁的认证码的构造[J].计算机学报,1999,22(9):949-952. 被引量:12
  • 8SAFAVI-NAINI R, WANG H. Multireceiver authentication codes: models, bounds, constructions and extensions[J]. Information and Computation, 1999,151( 1 ) : 148-172.
  • 9SAFAVI-NAINI R, WANG H. New results on multirecerver authentication codes[J]. Theoretical Computer Science, 2001, 269 ( 1/2 ) : 1-21.
  • 10DESMEDT Y, FRANKLE Y, YUNG M. Multi-Receiver/Multi-Sender Network Security: Efficient Authenticated Muhicast/Feedback [C]// IEEE Infocom'92,1992: 2045-2054.

二级参考文献15

共引文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部