Combinatorial Bounds on Authentication Codes with Arbitration

被引:0
|
作者
Kaoru Kurosawa
Satoshi Obana
机构
来源
关键词
cryptography; authentication code; arbitration;
D O I
暂无
中图分类号
学科分类号
摘要
Unconditionallysecure authentication codes with arbitration ( A2-codes)protect against deceptions from the transmitter and the receiveras well as that from the opponent. In this paper, we presentcombinatorial lower bounds on the cheating probabilities andthe sizes of keys of A2-codes. These bounds areall tight. Our main technique is a reduction of an A2-codeto a splitting A-code.
引用
收藏
页码:265 / 281
页数:16
相关论文
共 50 条
  • [1] Combinatorial bounds on authentication codes with arbitration
    Kurosawa, K
    Obana, S
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2001, 22 (03) : 265 - 281
  • [2] Combinatorial Classification of Optimal Authentication Codes with Arbitration
    Satoshi Obana
    Kaoru Kurosawa
    [J]. Designs, Codes and Cryptography, 2000, 20 : 281 - 305
  • [3] Combinatorial classification of optimal authentication codes with arbitration
    Obana, S
    Kurosawa, K
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2000, 20 (03) : 281 - 305
  • [4] Combinatorial bounds and characterizations of splitting authentication codes
    Huber, Michael
    [J]. CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2010, 2 (02): : 173 - 185
  • [5] Combinatorial bounds and characterizations of splitting authentication codes
    Michael Huber
    [J]. Cryptography and Communications, 2010, 2 : 173 - 185
  • [6] New Combinatorial Bounds for Authentication Codes and Key Predistribution Schemes
    Kurosawa K.
    Okada K.
    Saido H.
    Stinson D.R.
    [J]. Designs, Codes and Cryptography, 1998, 15 (1) : 87 - 100
  • [7] A Note on Authentication Codes with Arbitration
    李育强
    [J]. Chinese Quarterly Journal of Mathematics, 1997, (04) : 103 - 106
  • [8] GOB designs for authentication codes with arbitration
    Ge, Gennian
    Miao, Ying
    Zhu, L.
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2006, 40 (03) : 303 - 317
  • [9] Characterization of optimal authentication codes with arbitration
    Pei, DY
    Li, YQ
    Wang, YJ
    Safavi-Naini, R
    [J]. INFORMATION SECURITY AND PRIVACY, 1999, 1587 : 303 - 313
  • [10] GOB designs for authentication codes with arbitration
    Gennian Ge
    Ying Miao
    L. Zhu
    [J]. Designs, Codes and Cryptography, 2006, 40 : 303 - 317