We construct perfect authentication codes from the projective geometry over finite fields. There are three major constructions. The first construction is a perfect authentication code with splitting, the second construction is a perfect authentication codes with arbitration, and the third construction is a perfect authentication code without arbitration which is an extension of the second construction. Their parameters and probabilities of successful attacks are computed. (C) 2014 Elsevier Inc. All rights reserved.
机构:
Natl Univ Def Technol, Coll Liberal Arts & Sci, Changsha, Hunan, Peoples R China
Katholieke Univ Leuven, IMEC, COSIC, Leuven, BelgiumNatl Univ Def Technol, Coll Liberal Arts & Sci, Changsha, Hunan, Peoples R China
Liu, Yunwen
Qu, Longjiang
论文数: 0引用数: 0
h-index: 0
机构:
Natl Univ Def Technol, Coll Liberal Arts & Sci, Changsha, Hunan, Peoples R ChinaNatl Univ Def Technol, Coll Liberal Arts & Sci, Changsha, Hunan, Peoples R China
Qu, Longjiang
Li, Chao
论文数: 0引用数: 0
h-index: 0
机构:
Natl Univ Def Technol, Coll Liberal Arts & Sci, Changsha, Hunan, Peoples R ChinaNatl Univ Def Technol, Coll Liberal Arts & Sci, Changsha, Hunan, Peoples R China