Authentication Codes from Error-Correcting Codes; An Overview

被引:0
|
作者
van Tilborg, Henk [1 ]
机构
[1] Eindhoven Univ Technol, Dept Math & Comp Sci, NL-5600 MB Eindhoven, Netherlands
关键词
Authentication code; error-correcting code; projective plane; CONSTRUCTION;
D O I
10.3233/978-1-60750-002-5-3
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The purpose of an authentication code is to give proof that a message is authentic, i.e. it was not sent by an imposter and it has not been altered on its way to the receiver. Secrecy could also be an issue here, but in many cases the receiver just wants to be sure that the message is genuine. Unlike digital signature schemes, authentication codes aim at unconditional security. The opponent is assumed to have unlimited computer power. Many constructions of authentication codes are based on error correcting codes. After an introduction, an overview of these techniques will be given.
引用
收藏
页码:3 / 16
页数:14
相关论文
共 50 条
  • [1] On the cardinality of systematic authentication codes via error-correcting codes
    Kabatianskii, GA
    Smeets, B
    Johansson, T
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1996, 42 (02) : 566 - 578
  • [2] ERROR-CORRECTING CODES FOR AUTHENTICATION AND SUBLIMINAL CHANNELS
    SAFAVINAINI, RS
    SEBERRY, JR
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1991, 37 (01) : 13 - 17
  • [3] ERROR-CORRECTING CODES
    LACHAUD, G
    VLADUT, S
    [J]. RECHERCHE, 1995, 26 (278): : 778 - 782
  • [4] ERROR-CORRECTING CODES
    PETERSON, WW
    [J]. SCIENTIFIC AMERICAN, 1962, 206 (02) : 96 - &
  • [5] Authenticated Error-Correcting Codes with Applications to Multicast Authentication
    Lysyanskaya, Anna
    Tamassia, Roberto
    Triandopoulos, Nikos
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2010, 13 (02)
  • [6] A note on error-correcting codes for authentication and subliminal channels
    Yang, CN
    Laih, CS
    [J]. INFORMATION PROCESSING LETTERS, 1997, 62 (03) : 141 - 143
  • [7] SYNCHRONIZABLE ERROR-CORRECTING CODES
    BOSE, RC
    CALDWELL, JG
    [J]. INFORMATION AND CONTROL, 1967, 10 (06): : 616 - &
  • [8] RFID Authentication Protocols Based on Error-Correcting Codes: A Survey
    Noureddine Chikouche
    Foudil Cherif
    Pierre-Louis Cayrel
    Mohamed Benmohammed
    [J]. Wireless Personal Communications, 2017, 96 : 509 - 527
  • [9] BOUNDS FOR ERROR-CORRECTING CODES
    PETERSON, WW
    [J]. IRE TRANSACTIONS ON INFORMATION THEORY, 1962, 8 (01): : 60 - &
  • [10] A BOUND FOR ERROR-CORRECTING CODES
    GRIESMER, JH
    [J]. IBM JOURNAL OF RESEARCH AND DEVELOPMENT, 1960, 4 (05) : 532 - 542