首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 734 毫秒
1.
AConstructionofCartesianAuthenticationCodesfromVectorSpaceandDualAuthenticationCodesFengRongquan(冯荣权)(DepartmentofMathematics...  相似文献   

2.
In this paper, we present three algebraic constructions of authentication codes with secrecy. The first and the third class are optimal. Some of the codes in the second class are optimal, and others in the second class are asymptotically optimal. All authentication codes in the three classes provide perfect secrecy.  相似文献   

3.
Projective linear codes are a special class of linear codes whose dual codes have minimum distance at least 3. Projective linear codes with only a few weights are useful in authentication codes, secret sharing schemes, data storage systems and so on. In this paper, two constructions of q-ary linear codes are presented with defining sets given by the intersection and difference of two sets. These constructions produce several families of new projective two-weight or three-weight linear codes. As applications, our projective codes can be used to construct secret sharing schemes with interesting access structures, strongly regular graphs and association schemes with three classes.  相似文献   

4.
TWONEWCONSTRUCTIONSOFCARTESIANAUTHENTICATIONCODESFROMSYMPLECTICGEOMETRYGAOYOUANDZOUZENGJIA(DepartmentofBasicScience,Northeast...  相似文献   

5.
本文利用辛几何构作了两类 Cartesian认证码 ,计算了码的参数 .当编码规则按等概率分布选取时 ,计算出敌方成功的模仿攻击概率和成功的替换攻击概率  相似文献   

6.
利用有限域上酉几何构作两类Cartesian认证码   总被引:19,自引:0,他引:19  
本文利用有限域上的酉几何构作了两类Cartesian认证码,并且计算了它们的参数及成功的模仿攻击概率和成功的替换攻击概率。  相似文献   

7.
Authentication and secrecy codes which provide both secrecy and authentication have been intensively studied in the case where there is no splitting; however the results concerning the case where there is splitting are far fewer. In this paper, we focus on the case with c-splitting, and obtain a bound on the number of encoding rules required in order to obtain maximum levels of security. A c-splitting authentication and secrecy code is called optimal if it obtains maximum levels of security and has the minimum number of encoding rules. We define a new design, called an authentication perpendicular multi-array, and prove that the existence of authentication perpendicular multi-arrays implies the existence of optimal c-splitting authentication and secrecy codes. Further, we study the constructions and existence of authentication perpendicular multi-arrays, and then obtain two new infinite classes of optimal c-splitting authentication and secrecy codes.  相似文献   

8.
利用有限域上伪辛几何构作两类Cartesian认证码   总被引:5,自引:0,他引:5  
本文利用有限域上的伪辛几何构作了两类Cartesian认证码,并且计算了它们的参数及成功的模仿攻击概率和成功的替换攻击概率.  相似文献   

9.
Two constructions of cartesian authentication codes from unitary geometry are given in this paper. Their size parameters and their probabilities of successful impersonation attack and successful substitution attack are computed. They are optimal under some cases.  相似文献   

10.
§1.IntroductionLetS,EandMbethreenon-emptyfinitesetsandletf:S×E→Mbeamap.Thefourtuple(S,E,M;f)iscaledanauthenticationcode(see[1...  相似文献   

11.
Universal hashing and authentication codes   总被引:2,自引:0,他引:2  
In this paper, we study the application of universal hashing to the construction of unconditionally secure authentication codes without secrecy. This idea is most useful when the number of authenticators is exponentially small compared to the number of possible source states (plaintext messages). We formally define some new classes of hash functions and then prove some new bounds and give some general constructions for these classes of hash functions. Then we discuss the implications to authentication codes.A preliminary version of this paper was presented at CRYPTO '91 and appeared in Lecture Notes in Computer Science, vol. 576, pp. 74–85, Springer-Verlag, 1992.  相似文献   

12.
Construction of Cartesian authentication codes from unitary geometry   总被引:31,自引:0,他引:31  
In the present paper several constructions of Cartesian authentication codes from unitary geometry over finite fields are presented and their size parameters are computed. Assuming that the encoding rules are chosen according to a uniform probability distribution, the probabilities P I and P S of a successful impersonation attack and a successful substitution attack, respectively, of these codes are also computed. Moreover, those codes so constructed, for which P I and P S are nearly optimal, are also determined.  相似文献   

13.
In this paper, a characterization of authentication codes in terms of bipartite graphs is given. By using such a characterization, two necessary and sufficient conditions for a minimal authentication code with perfect secrecy are derived. The probabilities of a successful impersonation and of a successful substitution attack are discussed. As a result, some (optimal) minimal authentication codes with perfect secrecy are constructed from association schemes, from finite groups or from known authentication codes no matter whether the known ones are with or without secrecy.  相似文献   

14.
As a generalization of attenuated spaces, the concept of singular linear spaces was introduced in [K. Wang, J. Guo, F. Li, Association schemes based on attenuated spaces, European J. Combin. 31 (2010) 297–305]. This paper first gives two anzahl theorems in singular linear spaces, and then discusses their applications to the constructions of Deza digraphs, quasi-strongly regular graphs, lattices and authentication codes.  相似文献   

15.
利用酉几何构作带仲裁的认证码   总被引:4,自引:0,他引:4  
A family of authentication codes with arbitration is constructed from unitary geome-try,the parameters and the probabilities of deceptions of the codes are also computed. In a spe-cial case a perfect authentication code with arbitration is ohtalned.  相似文献   

16.
A family of authentication codes with arbitration are constructed over projective spaces, the parameters and the probabilities of deceptions of the codes are also computed. In a special case, a perfect authentication code with arbitration is obtained.  相似文献   

17.
本文研究各阶欺骗概率相等的、一般阶的最优认证码的构造。利用有限域上高次抛物线、M-序列和线性校验办法分别构造了一类保密最优认证码和两类Cartesian最优认证码。  相似文献   

18.
G. Ge  L. Zhu 《组合设计杂志》1997,5(2):111-124
Stinson introduced authentication perpendicular arrays APAλ (t, k,ν), as a special kind of perpendicular arrays, to construct authentication and secrecy codes. In this article, we generalize the known direct and recursive constructions and show that an APA1(2, 7, ν) exists if νodd > 9384255. We also improve the known existence result for APA1(2, 5, ν) by presenting five new orders so that such a design exists if and only if ν ≥ 5 is odd, except &ngr: = 7 and possibly excepting ν = 9, 13, 15, 17, 33, 39, 49, 57, 63, 69, 87, 97, and 113. © 1997 John Wiley & Sons, Inc.  相似文献   

19.
Fully diverse unitary space-time codes are useful in multiantenna communications, especially in multiantenna differential modulation. Recently, two constructions of parametric fully diverse unitary space-time codes for three antennas system have been introduced. We propose a new construction method based on the constructions. In the present paper, fully diverse codes for systems of odd prime number antennas are obtained from this construction. Space-time codes from present construction are found to have bet...  相似文献   

20.
In this paper, a type of combinatorial design (called difference packing array) is proposed and used to give a construction of systematic authentication codes. Taking advantage of this construction, some new series of systematic authentication codes are obtainable in terms of existing difference packing arrays.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号