期刊文献+

认证码的平衡化方法 被引量:2

Uniformization for Authentication Codes
在线阅读 下载PDF
导出
摘要 引入一种全新的编码算法(称其为平衡化方法),证明了任意一个认证码(或系统认证码)都可以通过平衡化方法转化为一种新的认证码,即平衡认证码(或平衡系统认证码),并依此得到了一般认证码在编码规则概率空间服从均匀分布时最大伪造概率的新下界. By constructing a new coding algorithm, called uniformization, it is proved that all authentication codes, or systematic authentication codes, can be uniformized into a new class of authentication codes, called uniibrmized authentication codes, or uniformized systematic authentication codes. With these codes a new lower bound of maximum probabilities of a successful impersonation for all general codes is derived if encoding rule distributions are equiprobable.
作者 杨建生 齐韬
机构地区 上海大学理学院
出处 《上海大学学报(自然科学版)》 CAS CSCD 北大核心 2006年第2期170-173,共4页 Journal of Shanghai University:Natural Science Edition
基金 国家自然科学基金资助项目(10171062)
关键词 认证码 系统认证码 平衡码 平衡化 authentication codes systematic authentication codes uniformized codes uniformization
  • 相关文献

参考文献7

  • 1SIMMONS G J.Authentication theory /coding theory[J].Lecture Notes in Computer Science,1985,196:411-432.
  • 2SIMMONS G J.The practice of authentication[J].Lecture Notes in Computer Science,1986,219:261-272.
  • 3STINSON D R.Some constructions and bounds for authentication codes[J].Journal of Cryptology,1988,1:37-51.
  • 4DE SOETE M.New bounds and constructions for authentication/secrecy codes with splitting[J].Journal of Cryptology,1991,3:173-186.
  • 5STINSON D R.Combinatorial characterizations of authentication codes[J].Designs,Codes and Cryptography,1992,2:175-187.
  • 6REES R S,STINSON D R.Combinatorial characterizations of authentication codes Ⅱ[J].Designs,Codes and Cryptography,1996,7:239-259.
  • 7KUROSAWA K,OKADA K,SAIDO H,et al.New combinatorial bounds for authentication codes and key predistribution schemes[J].Designs,Codes and Cryptography,1998,15:87-100.

同被引文献14

  • 1胡磊.On Construction of Optimal A^2-Codes[J].Northeastern Mathematical Journal,2001,17(1):27-33. 被引量:2
  • 2SIMMONS G J.Authentication theory/coding theory[J].Lecture Notes in Computer Science,1985,196:411-432.
  • 3DE SOETE M.New bounds and constructions for authentication/secrecy codes with splitting[J].Journal of Cryptology,1991,3:173-186.
  • 4JOHNANSSON T.Further results on asymmetric authentication schemes[J].Information and Computation,1999,151(1/2):100-133.
  • 5OGATA W,KUROSAWA K,STINSON D R,et al.New combinatorial designs and their aptications to authentication codes and secret sharing schemes[J].Discrete Mathematics,2004,279:383-405.
  • 6杨建生,徐雯.分裂认证码的平衡化方法[D].上海:上海大学,2007.
  • 7SIMMONS G J. Authentication theory/coding theory [J]. Lecture Notes in Computer Science, 1985, 196:411- 432.
  • 8JOHNASSON T. Further results on asymmetric authentication schemes [J]. Information and Computation, 1999, 151:100-133.
  • 9DE SOETE M. New bounds and constructions for authentication/secrecy codes with splitting [ J]. Journal of Cryptology, 1991, 3 (3) : 173-186.
  • 10OGATA W, KUROSAWA K, STINSON D R, et al. New combinatorial designs and their applications to authentication codesand secret sharing schemes [ J ]. Discrete Math, 2004, 279:383-405.

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部