首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到19条相似文献,搜索用时 78 毫秒
1.
基于酉几何的具有仲裁的认证码的构造   总被引:8,自引:0,他引:8  
具有仲裁的认证码即要防止敌手的欺骗,又要防止收方和发方的互相欺骗.本文给出一种由酉几何构造具有仲裁的认证码的方法,并计算了有关参娄,分析了各种攻击成功的概率。  相似文献   

2.
带仲裁的认证码既要防止敌人的欺骗,又要防止收方和发方的相互欺骗.文章利用有限域上奇异酉几何构造了一个新的带仲裁的认证码,计算了这个码的各种参数.当收方和发方的编码规则按等概率分布选取时,计算出了各种攻击成功的概率.  相似文献   

3.
本文研究各阶欺骗概率相等的、一般阶的最优认证码的构造。利用有限域上高次抛物线、M-序列和线性校验办法分别构造了一类保密最优认证码和两类Cartesian最优认证码。  相似文献   

4.
李育强 《数学进展》2001,30(2):165-171
本文给出了带有仲裁认证码的组合论下界,并利用带有约束的t-设计,给出了敌方的r阶欺骗攻击成功的概率达到下界的带有仲裁认证码的组合结构。  相似文献   

5.
在通信中,发方发送信息给一群收方.但是,发方或者部分收方有时会联合欺骗群组中的某个成员.多接收认证码能够有效地阻止这种欺骗攻击.本文的目的是研究多接收认证码的构造问题.运用有限域上的辛几何这一工具,构造了一类带仲裁的多接收认证码,并证明其合理性.然后,充分运用辛空间的子空间结构及其计数原理,计算了相关参数以及被各类攻击成功的最大概率.最后,对该多接收认证码所受到的来自发方的假冒攻击进行仿真.  相似文献   

6.
在通信中,发方发送信息给一群收方.但是,发方或者部分收方有时会联合欺骗群组中的某个成员.多接收认证码能够有效地阻止这种欺骗攻击.本文的目的是研究多接收认证码的构造问题.运用有限域上的辛几何这一工具,构造了一类带仲裁的多接收认证码,并证明其合理性.然后,充分运用辛空间的子空间结构及其计数原理,计算了相关参数以及被各类攻击成功的最大概率.最后,对该多接收认证码所受到的来自发方的假冒攻击进行仿真.  相似文献   

7.
对一般的(带保密的)多个接收者认证码进行了讨论,给出了这类认证码的r阶欺骗攻击成功概率的信息论下界,并利用部分平衡t-设计和狭义区组设计刻划了达到信息论下界的多个接收者认证码的组合特征。  相似文献   

8.
本文首次给出了一类具有任意给定阶的最优带仲裁认证码的构造方法.  相似文献   

9.
本文研究带仲裁认证码(亦称A^2-码)。一个A^2-码,当它的欺骗攻击成功概率达到信息论下界且密钥长度也达到最小时称为是最优的。本文给出最优A^2-码的组合结构的特征,从而将构造最优A^2-码的问题归结为构造相应的一类组合设计的问题。  相似文献   

10.
利用奇、偶特征有限域上的正交几何构作出一类C artesian认证码,并且计算了它们的参数.并在假定按照等概率分布来选择编码规则下,求出了认证码的成功的模仿攻击概率和成功的替换攻击概率.作为一个推论,还得到了一些最优的C artesian认证码.  相似文献   

11.
Authentication codes with arbitration protect against deceptions from the transmitter and the receiver as well as that from the opponent. An authentication code with arbitration is t-fold perfect if the numbers of decoding rules and encoding rules meet the information-theoretic lower bounds. Pei (Message authentication codes (in Chinese). USCT, Hefei, 2009) pointed out that there has not yet been able to construct t-fold perfect authentication codes with arbitration for \(t > 2\) . In this paper, we define a new design, perfect strong strict restricted partially balanced t-design, and prove that the existence of perfect strong strict restricted partially balanced t-designs implies the existence of t-fold perfect authentication codes with arbitration. Further, we obtain some new infinite classes of t-fold perfect authentication codes with arbitration.  相似文献   

12.
利用酉几何构作带仲裁的认证码   总被引:4,自引:0,他引:4  
A family of authentication codes with arbitration is constructed from unitary geome-try,the parameters and the probabilities of deceptions of the codes are also computed. In a spe-cial case a perfect authentication code with arbitration is ohtalned.  相似文献   

13.
A family of authentication codes with arbitration are constructed over projective spaces, the parameters and the probabilities of deceptions of the codes are also computed. In a special case, a perfect authentication code with arbitration is obtained.  相似文献   

14.
利用有限域上酉几何构作一类新的带仲裁的认证码,并且计算了所构作认证码的参数以及各种攻击成功的概率.  相似文献   

15.
Combinatorial characterization of optimal authentication codes with arbitration was previously given by several groups of researchers in terms of affine α-resolvable + BIBDs and α-resolvable designs with some special properties, respectively. In this paper, we revisit this known characterization and restate it using a new idea of GOB designs. This newly introduced combinatorial structure simplifies the characterization, and enables us to extend Johansson’s well-known family of optimal authentication codes with arbitration to any finite projective spaces with dimension greater than or equal to 3.  相似文献   

16.
On Construction of Optimal A2-Codes   总被引:2,自引:0,他引:2  
胡磊 《东北数学》2001,17(1):27-33
§ 1.Introduction Theauthenticationcodeswitharbitration (A2 codes)areintroducedbySimmons[1]andstudiedinmanypapers (forexample ,[1— 8] ) .Oneofthemostimportantproblemsinthestudyofauthenticationcodesistofindlowerboundsoncheatingprobabilitiesandonthenumbersofencodi…  相似文献   

17.
利用有限域上奇异伪辛几何构作了一个新的具有仲裁的认证码,计算了这个码的参数,当发方编码规则和收方解码规则按等概率分布选取时,计算出各种攻击成功的概率.  相似文献   

18.
A construction of authentication codes with arbitration from singular pseudo-symplectic geometry over finite fields is given and the parameters of the code are computed. Under the assumption that the encoding rules of the transmitter and the receiver are chosen according to a uniform probability distribution, the probabilities of success for different types of deceptions are also computed.  相似文献   

19.
Unconditionallysecure authentication codes with arbitration ( A2-codes)protect against deceptions from the transmitter and the receiveras well as that from the opponent. In this paper, we presentcombinatorial lower bounds on the cheating probabilities andthe sizes of keys of A2-codes. These bounds areall tight. Our main technique is a reduction of an A2-codeto a splitting A-code.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号