This paper derives some further results on unconditionally secure asymmetric authentication schemes. It starts by giving a general framework for constructing A2-codes, identifying many known constructions as special cases. Then a full treatment of A3-codes (A2-codes protecting against arbiter's attacks) is given, including bounds on the parameters and optimal constructions. With these models as a basis, we proceed by giving constructions of general asymmetric authentication schemes, i.e., schemes protecting against specified arbitrary sets of participants collaborating in order to cheat someone else. As a consequence, we improve upon Chaum and Roijakkers interactive construction of unconditionally secure digital signatures and present a (no...
This paper provides new combinatorial bounds and characterizations of authentication codes (A-codes)...
The authentication codes resistant to messages imitation and substitution are investigated. The case...
In cryptographic applications, there is often a need for protecting privacy of users besides integri...
AbstractThis paper derives some further results on unconditionally secure asymmetric authentication ...
AbstractThis paper derives some further results on unconditionally secure asymmetric authentication ...
AbstractIn this paper, we present three algebraic constructions of authentication codes with secrecy...
In this paper, we present three algebraic constructions of authentication codes with secrecy. The co...
AbstractThere are several approaches to the construction of authentication codes without secrecy usi...
AbstractIn this paper, we present three algebraic constructions of authentication codes with secrecy...
Authentication codes have been developed since 1974, while error correcting codes have a longer hist...
Authentication theory deals with problems connected with the protection of information sent over ins...
Abstract-This paper investigates a model for authentication in which not only an outsider, but also ...
For any authentication code for k source states and v messages having minimum possible deception pro...
Authentication codes that permit arbitration are codes that unconditionally protect against deceptio...
Authentication codes that permit arbitration are codes that unconditionally protect against deceptio...
This paper provides new combinatorial bounds and characterizations of authentication codes (A-codes)...
The authentication codes resistant to messages imitation and substitution are investigated. The case...
In cryptographic applications, there is often a need for protecting privacy of users besides integri...
AbstractThis paper derives some further results on unconditionally secure asymmetric authentication ...
AbstractThis paper derives some further results on unconditionally secure asymmetric authentication ...
AbstractIn this paper, we present three algebraic constructions of authentication codes with secrecy...
In this paper, we present three algebraic constructions of authentication codes with secrecy. The co...
AbstractThere are several approaches to the construction of authentication codes without secrecy usi...
AbstractIn this paper, we present three algebraic constructions of authentication codes with secrecy...
Authentication codes have been developed since 1974, while error correcting codes have a longer hist...
Authentication theory deals with problems connected with the protection of information sent over ins...
Abstract-This paper investigates a model for authentication in which not only an outsider, but also ...
For any authentication code for k source states and v messages having minimum possible deception pro...
Authentication codes that permit arbitration are codes that unconditionally protect against deceptio...
Authentication codes that permit arbitration are codes that unconditionally protect against deceptio...
This paper provides new combinatorial bounds and characterizations of authentication codes (A-codes)...
The authentication codes resistant to messages imitation and substitution are investigated. The case...
In cryptographic applications, there is often a need for protecting privacy of users besides integri...