期刊文献+
共找到573篇文章
< 1 2 29 >
每页显示 20 50 100
CONSTRUCTION OF AUTHENTICATION CODES WITH ARBITRATION FROM UNITARY GEOMETRY 被引量:4
1
作者 Li Ruihu\ Guo Luobin 《Applied Mathematics(A Journal of Chinese Universities)》 SCIE CSCD 1999年第4期475-480,共6页
A family of authentication codes with arbitration is constructed from unitary geometry,the parameters and the probabilities of deceptions of the codes are also computed.In a special case a perfect authentication code ... A family of authentication codes with arbitration is constructed from unitary geometry,the parameters and the probabilities of deceptions of the codes are also computed.In a special case a perfect authentication code with arbitration is obtained. 展开更多
关键词 authentication codes ARBITER unitary geom etry
下载PDF
Using Normal Form of Nilpotent Matrices over Finite Fields to Construct Cartesian Authentication Codes 被引量:5
2
作者 赵辉芳 秦德生 《Northeastern Mathematical Journal》 CSCD 2004年第4期415-423,共9页
Let Fq be a finite field. In this paper, a construction of Cartesian au-thentication codes from the normal form of a class of nilpotent matrices over the field Fq is presented. Moreover, assume that the encoding rules... Let Fq be a finite field. In this paper, a construction of Cartesian au-thentication codes from the normal form of a class of nilpotent matrices over the field Fq is presented. Moreover, assume that the encoding rules are chosen according to a uniform probability distribution, the probabilities PI and PS, of a successful im-personation attack and of a successful substitution attack respectively, of these codes are also computed. 展开更多
关键词 cartesian authentication codes finite field nilpotent matrices
下载PDF
A Note on Authentication Codes with Arbitration 被引量:1
3
作者 李育强 《Chinese Quarterly Journal of Mathematics》 CSCD 1997年第4期103-106, ,共4页
By use of partially balanced t-designs (v,b, k;λ,0) that is constructed by the rational normal curves given by [5] and the Cartesian product given by [4],an authentication code with arbitration is constructed and its... By use of partially balanced t-designs (v,b, k;λ,0) that is constructed by the rational normal curves given by [5] and the Cartesian product given by [4],an authentication code with arbitration is constructed and its probability of success of attacks by the transmitter, the receiver and the opponent is obtained in this paper. 展开更多
关键词 authentication codes ARBITRATION partially balanced t-designs
下载PDF
A construction of authentication codes with arbitration based on orthogonal spaces
4
作者 BOUBACAR ABBA 游宏 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2006年第2期134-140,共7页
In this paper we give a new construction of authentication codes with arbitration using orthogonal spaces. Some parameters and the probabilities of successful attacks are computed.
关键词 authentication codes with arbitration orthogonal spaces finite field
下载PDF
Using Normal Form of Idempotent Matrices over Finite Local Ring Z/p^kZ to Construct Cartesian Authentication Codes 被引量:1
5
作者 赵辉芳 南基洙 《Northeastern Mathematical Journal》 CSCD 2007年第2期123-131,共9页
In this paper, we determine the normal forms of idempotent matrices for similarity over finite local rings Z/p^kZ, from which we construct a Cartesian authentication code and compute its size parameters and the probab... In this paper, we determine the normal forms of idempotent matrices for similarity over finite local rings Z/p^kZ, from which we construct a Cartesian authentication code and compute its size parameters and the probabilities of successful impersonation and substitution attack under the hypothesis that the cecoding rules are chosen according to a uniform probability distribution. 展开更多
关键词 idempotent matrix finite local ring Cartesian authentication code
下载PDF
A Construction of Multi-Sender Authentication Codes from Eigenvalues and Eigenvectors of the Matrix Over Finite Fields
6
作者 Xiuli Wang Lina Wang Yakun Hao 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2019年第1期51-60,共10页
We construct one multi-sender authentication code by algebraic combination method from eigenvalues and eigenvectors of the matrix over nite elds. Some parameters and the probabilities of three kinds of successful atta... We construct one multi-sender authentication code by algebraic combination method from eigenvalues and eigenvectors of the matrix over nite elds. Some parameters and the probabilities of three kinds of successful attack of this code are also computed. For multi-sender authentication code,it allows a group of senders to construct an authenticated message for a receiver such that the receiver can verify authenticity of the received message. 展开更多
关键词 multi-sender authentication codes NONSINGULAR symmetric matrix EIGENVALUES EIGENVECTORS finite fields
下载PDF
A Construction Method of Cartesian Authentication Codes from B N Pair Decomposition of SL_n(F_q)
7
作者 陈殿友 付治国 韩燕 《Northeastern Mathematical Journal》 CSCD 2007年第6期523-531,共9页
In the present paper, a construction of Cartesian authentication codes by using the BN pair decomposition of special linear group is presented. Moreover, under the case that the encoding rules are chosen according to ... In the present paper, a construction of Cartesian authentication codes by using the BN pair decomposition of special linear group is presented. Moreover, under the case that the encoding rules are chosen according to a uniform probability distribution, the probability of a successful impersonation attack and the probability of a successful substitution attack of the code are computed. 展开更多
关键词 authentication code special linear group BN pair decomposition
下载PDF
Using Normal Form of Matrices over Finite Fields to Construct Cartesian Authentication Codes 被引量:8
8
作者 游宏 南基洙 《Journal of Mathematical Research and Exposition》 CSCD 1998年第3期341-346,共6页
In this paper, one construction of Cartesian authentication codes from the normal form of matrices over finite fields are presented and its size parameters are computed. Moreover, assume that the encoding rules are ch... In this paper, one construction of Cartesian authentication codes from the normal form of matrices over finite fields are presented and its size parameters are computed. Moreover, assume that the encoding rules are chosen according to a uniform probability distribution, the P I and P S , which denote the largest probabilities of a successful impersonation attack and of a successful substitution attack respectively, of these codes are also computed. 展开更多
关键词 cartesian authentication codes finite field normal form of matrices.
下载PDF
Construction of Authentication Codes with Arbitration from Singular Pseudo-Symplectic Geometry over Finite Fields
9
作者 GAO You WANG Hong Li 《Journal of Mathematical Research and Exposition》 CSCD 2009年第1期9-18,共10页
A construction of authentication codes with arbitration from singular pseudo-symplectic geometry over finite fields is given and the parameters of the code are computed. Under the assumption that the encoding rules of... A construction of authentication codes with arbitration from singular pseudo-symplectic geometry over finite fields is given and the parameters of the code are computed. Under the assumption that the encoding rules of the transmitter and the receiver are chosen according to a uniform probability distribution, the probabilities of success for different types of deceptions are also computed. 展开更多
关键词 finite fields singular pseudo-symplectic geometry authentication codes with arbitration.
下载PDF
EXISTENCE OF AUTHENTICATION CODES 被引量:3
10
作者 FENG Rong quan (School of Mathematical Sciences, Peking University, Beijing 100871, China) 《Systems Science and Mathematical Sciences》 SCIE EI CSCD 2000年第1期108-112,共5页
1.IntroductionLetS,e,andMbethreenon--emptysetsandletf:Sxe--+Mbeamap;thefourtuple(S,E,M;f)iscalledanauthenticationcoded],if1)Themapf:Sxe-Missurjectiveand2)ForanymEMandeEE,ifthereisansESsatisfyingf(s,e)=m,thensuchansisu... 1.IntroductionLetS,e,andMbethreenon--emptysetsandletf:Sxe--+Mbeamap;thefourtuple(S,E,M;f)iscalledanauthenticationcoded],if1)Themapf:Sxe-Missurjectiveand2)ForanymEMandeEE,ifthereisansESsatisfyingf(s,e)=m,thensuchansisuniquelydeterminedbythegivenmande... 展开更多
关键词 authentication CODE CARTESIAN authentication CODE OPTIMAL existence.
原文传递
TWO NEW CONSTRUCTIONS OF CARTESIAN AUTHENTICATION CODES FROM SYMPLECTIC GEOMETRY 被引量:4
11
作者 GAO YOU AND ZOU ZENGJIA (Department of Basic Science, Northeast Institute of Electric Power, Jinn 132012). 《Applied Mathematics(A Journal of Chinese Universities)》 SCIE CSCD 1995年第3期345-356,共12页
In this paper, two new constructions of Cartesian authentication codes from symplectic geometry are presented and their size parameters are computed.
关键词 Cartesian authentication code construction symplectic geometry
下载PDF
Two Constructions of Optimal Cartesian Authentication Codes from Unitary Geometry over Finite Fields 被引量:3
12
作者 Shang-di CHEN Da-wei ZHAO 《Acta Mathematicae Applicatae Sinica》 SCIE CSCD 2013年第4期829-836,共8页
Two constructions of cartesian authentication codes from unitary geometry are given in this paper. Their size parameters and their probabilities of successful impersonation attack and successful substitution attack ar... Two constructions of cartesian authentication codes from unitary geometry are given in this paper. Their size parameters and their probabilities of successful impersonation attack and successful substitution attack are computed. They are optimal under some cases. 展开更多
关键词 unitary geometry optimal authentication code finite field
原文传递
TuLP: A Family of Lightweight Message Authentication Codes for Body Sensor Networks 被引量:2
13
作者 龚征 Pieter Hartel +2 位作者 Svetla Nikova 唐韶华 朱博 《Journal of Computer Science & Technology》 SCIE EI CSCD 2014年第1期53-68,共16页
A wireless sensor network (WSN) commonly whilst a body sensor network (BSN) must be secured with requires lower level security for public information gathering, strong authenticity to protect personal health infor... A wireless sensor network (WSN) commonly whilst a body sensor network (BSN) must be secured with requires lower level security for public information gathering, strong authenticity to protect personal health information. In this paper, some practical problems with the message authentication codes (MACs), which were proposed in the popular security architectures for WSNs, are reconsidered. The analysis shows that the recommended MACs for WSNs, e.g., CBC- MAC (TinySec), OCB-MAC (MiniSec), and XCBC-MAC (SenSee), might not be exactly suitable for BSNs. Particularly an existential forgery attack is elaborated on XCBC-MAC. Considering the hardware limitations of BSNs, we propose a new family of tunable lightweight MAC based on the PRESENT block cipher. The first scheme, which is named TukP, is a new lightweight MAC with 64-bit output range. The second scheme, which is named TuLP-128, is a 128-bit variant which provides a higher resistance against internal collisions. Compared with the existing schemes, our lightweight MACs are both time and resource efficient on hardware-constrained devices. 展开更多
关键词 message authentication code body sensor network low-resource implementation
原文传递
A Construction of Authentication Codes with Arbitration from Vector Spaces over Finite Fields 被引量:3
14
作者 Wei Jia LI Ji Zhu NAN 《Journal of Mathematical Research and Exposition》 CSCD 2011年第2期269-278,共10页
This paper is devoted to constructing an authentication code with arbitration using subspaces of vector spaces over finite fields.Moreover,if we choose the encoding rules of the transmitter and the decoding rules of t... This paper is devoted to constructing an authentication code with arbitration using subspaces of vector spaces over finite fields.Moreover,if we choose the encoding rules of the transmitter and the decoding rules of the receiver according to a uniform probability distribution,then some parameters and the probabilities of successful attacks are computed. 展开更多
关键词 authentication code with arbitration vector space finite field
下载PDF
Message Authentication Scheme Based on Quantum Error-correction Codes 被引量:1
15
作者 Ying Guo Guihua Zeng Yun Mao 《通讯和计算机(中英文版)》 2006年第7期36-39,共4页
关键词 美国昆腾公司 技术鉴定 编译程序 技术创新
下载PDF
Difference packing arrays and systematic authentication codes
16
作者 YIN JianxingDepartment of Mathematics, Suzhou University, Suzhou 215006, China 《Science China Mathematics》 SCIE 2004年第4期566-577,共12页
In this paper, a type of combinatorial design (called difference packing array)is proposed and used to give a construction of systematic authentication codes. Taking advantage of this construction, some new series of ... In this paper, a type of combinatorial design (called difference packing array)is proposed and used to give a construction of systematic authentication codes. Taking advantage of this construction, some new series of systematic authentication codes are obtainable in terms of existing difference packing arrays. 展开更多
关键词 authentication codes DIFFERENCE PACKING arrays constructions.
原文传递
Construction of authentication codes with distrust arbitration from polynomials over finite fields
17
作者 Chen Shangdi Tian Wenjing Li Xue 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2017年第1期87-95,共9页
The authentication codes with arbitration are able to solve dispute between the sender and the receiver. The authentication codes with trusted arbitration are called AZ-codes, the authentication codes with distrust ar... The authentication codes with arbitration are able to solve dispute between the sender and the receiver. The authentication codes with trusted arbitration are called AZ-codes, the authentication codes with distrust arbitration are called A3-codes . As an expansion of Az-cOdes , an A3-code is an authentication system which is closer to the reality environment. Therefore, A3-codes have more extensive application value. In this paper, we construct a class of A3-codes based on polynomials over finite fields, give the parameters of the constructed codes, and calculate a variety of cheating attacks the maximum probabilities of success. Especially, in a special case, the constructed A3-codes are perfect. Compared with a known type of codes, they have almost the same security level, however, our codes need less storage requirements. Therefore, our codes have more advantages. 展开更多
关键词 authentication code distrust arbitration POLYNOMIAL finite field PERFECT
原文传递
Construction of Authentication Codes with Double Arbiters over Symplectic Geometry
18
作者 Shang-di CHEN Hao MA 《Acta Mathematicae Applicatae Sinica》 SCIE CSCD 2015年第4期1141-1152,共12页
In a common authentication code with arbitration, the dishonest arbiter may make a threat to the security of authentication system. In this paper, an authentication code with double arbiters over symplectic geometry i... In a common authentication code with arbitration, the dishonest arbiter may make a threat to the security of authentication system. In this paper, an authentication code with double arbiters over symplectic geometry is constructed, and the relevant parameters and the probabilities of successful attacks are calculated. The model not only prevents deception from the opponent and members of the system, but also effectively limits the attacks of single arbiter. Moreover, the collusion attacks from arbiters and participators are difficult to succeed. 展开更多
关键词 authentication code double arbiters symplectic geometry
原文传递
Homomorphic Error-Control Codes for Linear Network Coding in Packet Networks
19
作者 Xiaodong Han Fei Gao 《China Communications》 SCIE CSCD 2017年第9期178-189,共12页
In this work, the homomorphism of the classic linear block code in linear network coding for the case of binary field and its extensions is studied. It is proved that the classic linear error-control block code is hom... In this work, the homomorphism of the classic linear block code in linear network coding for the case of binary field and its extensions is studied. It is proved that the classic linear error-control block code is homomorphic network error-control code in network coding. That is, if the source packets at the source node for a linear network coding are precoded using a linear block code, then every packet flowing in the network regarding to the source satisfies the same constraints as the source. As a consequence, error detection and correction can be performed at every intermediate nodes of multicast flow, rather than only at the destination node in the conventional way, which can help to identify and correct errors timely at the error-corrupted link and save the cost of forwarding error-corrupted data to the destination node when the intermediate nodes are ignorant of the errors. In addition, three examples are demonstrated which show that homomorphic linear code can be combined with homomorphic signature, McEliece public-key cryptosystem and unequal error protection respectively and thus have a great potential of practical utility. 展开更多
关键词 NETWORK CODING NETWORK errorcorrection homomorphic LINEAR CODE multi-cast
下载PDF
A novel approach to authenticated group key transfer protocol based on AG codes
20
作者 Yuan Dezhai Peng Xingyi +1 位作者 Liu Ting Cui Zhe 《High Technology Letters》 EI CAS 2019年第2期129-136,共8页
Group key management technique is a fundamental building block for secure and reliable group communication systems.In order to successfully achieve this goal, group session key needs to be generated and distributed to... Group key management technique is a fundamental building block for secure and reliable group communication systems.In order to successfully achieve this goal, group session key needs to be generated and distributed to all group members in a secure and authenticated manner.The most commonly used method is based on Lagrange interpolating polynomial over the prime field F p={0,1,2,…, p-1}. A novel approach to group key transfer protocol based on a category of algebraic-geometry code is presented over the infinite field GF(2 m). The attractive advantages are obvious. Especially, the non-repeatability, confidentiality, and authentication of group key transfer protocols are obtained easily. Besides, a more generalized and simple mathematical construction model is proposed which also can be applied perfectly to related fields of information security. 展开更多
关键词 group key transfer protocol erasure code AG codes non-repeatability CONFIDENTIALITY authentication
下载PDF
上一页 1 2 29 下一页 到第
使用帮助 返回顶部