메뉴 건너뛰기




Volumn 49, Issue 4, 2003, Pages 866-872

Linear authentication codes: Bounds and constructions

Author keywords

Authentication codes (A codes); Distributed A codes; Linear A codes

Indexed keywords

INFORMATION THEORY; PARAMETER ESTIMATION; PROBABILITY; VECTORS;

EID: 0037399287     PISSN: 00189448     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIT.2003.809567     Document Type: Article
Times cited : (97)

References (28)
  • 1
    • 0000057495 scopus 로고    scopus 로고
    • Universal hashing and geometric codes
    • J. Bierbrauer, "Universal hashing and geometric codes," Des, Codes Cryptogr., vol. 11, pp. 207-221, 1997.
    • (1997) Des, Codes Cryptogr. , vol.11 , pp. 207-221
    • Bierbrauer, J.1
  • 2
    • 84974696785 scopus 로고
    • On families of hash functions via geometric codes and concatenation
    • Advances in Cryptology - CRYPTO'93. Berlin, Germany: Springer-Verlag
    • J. Bierbrauer, T. Johansson, G. Kabatianskii, and B. Smeets, "On families of hash functions via geometric codes and concatenation," in Advances in Cryptology - CRYPTO'93 (Lecture Notes in Computer Science). Berlin, Germany: Springer-Verlag, 1994, vol. 773, pp. 331-342.
    • (1994) Lecture Notes in Computer Science , vol.773 , pp. 331-342
    • Bierbrauer, J.1    Johansson, T.2    Kabatianskii, G.3    Smeets, B.4
  • 3
    • 0001078413 scopus 로고
    • A few results in message authentication
    • E. F. Brickell, "A few results in message authentication," Congressus Numerantium, vol. 43, pp. 141-154, 1984.
    • (1984) Congressus Numerantium , vol.43 , pp. 141-154
    • Brickell, E.F.1
  • 4
    • 0018456171 scopus 로고
    • Universal classes of hash functions
    • J. L. Carter and M. N. Wegman, "Universal classes of hash functions," J. Comput. Syst. Sci., vol. 18, pp. 143-154, 1979.
    • (1979) J. Comput. Syst. Sci. , vol.18 , pp. 143-154
    • Carter, J.L.1    Wegman, M.N.2
  • 5
    • 0013259203 scopus 로고
    • A simple and key-economical unconditional authentication scheme
    • B. den Boer, "A simple and key-economical unconditional authentication scheme," J. Comput. Security, vol. 2, pp. 65-71, 1993.
    • (1993) J. Comput. Security , vol.2 , pp. 65-71
    • Den Boer, B.1
  • 6
    • 85032188633 scopus 로고
    • Society and group oriented cryptology: A new concept
    • Advances in Cryptography - CRYPTO '87. Berlin, Germany: Sprilnger-Verlag
    • Y. Desmedt, "Society and group oriented cryptology: A new concept," in Advances in Cryptography - CRYPTO '87 (Lecture Notes in Computer Science). Berlin, Germany: Sprilnger-Verlag, 1988, vol. 293, pp. 120-127.
    • (1988) Lecture Notes in Computer Science , vol.293 , pp. 120-127
    • Desmedt, Y.1
  • 7
    • 0026992399 scopus 로고
    • Multi-receiver/Multi-sender network security: Efficient authenticated multicast/feedback
    • Y. Desmedt, Y. Frankel, and M. Yung, "Multi-receiver/Multi-sender network security: Efficient authenticated multicast/feedback," in Proc. IEEE INFOCOM'92, 1992, pp. 2045-2054.
    • (1992) Proc. IEEE INFOCOM'92 , pp. 2045-2054
    • Desmedt, Y.1    Frankel, Y.2    Yung, M.3
  • 8
    • 0345234062 scopus 로고    scopus 로고
    • Unconditionally secure group authentication
    • M. van Dijk, C. Gehrmann, and B. Smeets, "Unconditionally secure group authentication," Des., Codes Cryptogr., vol. 14, pp. 281-296, 1998.
    • (1998) Des., Codes Cryptogr. , vol.14 , pp. 281-296
    • Van Dijk, M.1    Gehrmann, C.2    Smeets, B.3
  • 9
    • 0021941233 scopus 로고
    • Theory of codes with maximum rank distance
    • E. M. Gabidulin, "Theory of codes with maximum rank distance," Probl. Inform. Transm., vol. 21, no. 1, pp. 1-12, 1985.
    • (1985) Probl. Inform. Transm. , vol.21 , Issue.1 , pp. 1-12
    • Gabidulin, E.M.1
  • 12
    • 0000608701 scopus 로고
    • Authentication codes for nontrusting parties obtained from rank metric codes
    • _, "Authentication codes for nontrusting parties obtained from rank metric codes," Des., Codes Cryptogr., vol. 6, pp. 205-218, 1995.
    • (1995) Des., Codes Cryptogr. , vol.6 , pp. 205-218
  • 13
    • 0001925043 scopus 로고    scopus 로고
    • Further results on asymmetric authentication schemes
    • _, "Further results on asymmetric authentication schemes," Inform. Comput., vol. 151, no. 1/2, pp. 100-133, 1999.
    • (1999) Inform. Comput. , vol.151 , Issue.1-2 , pp. 100-133
  • 14
    • 0030106709 scopus 로고    scopus 로고
    • On the cardinality of systematic authentication codes via error correcting
    • Mar.
    • G. Kabatianskii, B. Smeets, and T. Johansson, "On the cardinality of systematic authentication codes via error correcting," IEEE Trans. Inform. Theory, vol. 42, pp. 566-578, Mar. 1996.
    • (1996) IEEE Trans. Inform. Theory , vol.42 , pp. 566-578
    • Kabatianskii, G.1    Smeets, B.2    Johansson, T.3
  • 16
    • 21944444884 scopus 로고    scopus 로고
    • Multisender authentication schemes with unconditional security
    • Information and Communications Security. Berlin, Germany: Springer-Verlag
    • K. Martin and R. Safavi-Naini, "Multisender authentication schemes with unconditional security," in Information and Communications Security (Lecture Notes in Computer Science). Berlin, Germany: Springer-Verlag, 1997, vol. 1334, pp. 130-143.
    • (1997) Lecture Notes in Computer Science , vol.1334 , pp. 130-143
    • Martin, K.1    Safavi-Naini, R.2
  • 17
    • 0345234066 scopus 로고    scopus 로고
    • Three systems for shared generation of authenticators
    • R. Safavi-Naini, "Three systems for shared generation of authenticators," Des., Codes Cryptogr., vol. 13, 1998.
    • (1998) Des., Codes Cryptogr. , vol.13
    • Safavi-Naini, R.1
  • 18
    • 84957715332 scopus 로고    scopus 로고
    • New results on multi-receiver authentication codes
    • Advances in Cryptology - Eurbcrypt '98. Berlin, Germany: Springer-Verlag
    • R. Safavi-Naini and H. Wang, "New results on multi-receiver authentication codes," in Advances in Cryptology - Eurbcrypt '98 (Lecture Notes in Computer Science). Berlin, Germany: Springer-Verlag, 1998, vol. 1438, pp. 527-541.
    • (1998) Lecture Notes in Computer Science , vol.1438 , pp. 527-541
    • Safavi-Naini, R.1    Wang, H.2
  • 19
    • 0001531989 scopus 로고    scopus 로고
    • Multireceiver authentication codes: Models, bounds, constructions and extensions
    • _, "Multireceiver authentication codes: Models, bounds, constructions and extensions," Inform. Comput., vol. 151, no. 1/2, pp. 148-172, 1999.
    • (1999) Inform. Comput. , vol.151 , Issue.1-2 , pp. 148-172
  • 20
    • 23044523764 scopus 로고    scopus 로고
    • Fail-stop signature for long messages
    • Indocrypt'00. Berlin, Germany: Springer-Verlag
    • R. Safavi-Naini, W. Susilo, and H. Wang, "Fail-stop signature for long messages," in Indocrypt'00 (Lecture Notes in Computer Science). Berlin, Germany: Springer-Verlag, 2000, vol. 1977, pp. 165-177.
    • (2000) Lecture Notes in Computer Science , vol.1977 , pp. 165-177
    • Safavi-Naini, R.1    Susilo, W.2    Wang, H.3
  • 21
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir, "How to share a secret," Commun. ACM, vol. 22, pp. 612-613, 1979.
    • (1979) Commun. ACM , vol.22 , pp. 612-613
    • Shamir, A.1
  • 22
    • 84983269168 scopus 로고
    • Authentication theory/coding theory
    • Advances in Cryptology-Crypto '84. Berlin, Germany: Springer-Verlag
    • G. J. Simmons, "Authentication theory/coding theory," in Advances in Cryptology-Crypto '84 (Lecture Notes in Computer Science). Berlin, Germany: Springer-Verlag, 1984, vol. 196, pp. 411-431.
    • (1984) Lecture Notes in Computer Science , vol.196 , pp. 411-431
    • Simmons, G.J.1
  • 23
    • 0003038453 scopus 로고
    • A survey of information authentication
    • G. J. Simmons, Ed. Piscataway, NJ: IEEE Press
    • _, "A survey of information authentication," in Contemporary Cryptology, The Science of Information Integrity, G. J. Simmons, Ed. Piscataway, NJ: IEEE Press, 1992, pp. 379-419.
    • (1992) Contemporary Cryptology, The Science of Information Integrity , pp. 379-419
  • 24
    • 33749925176 scopus 로고
    • On the construction of authentication codes with secrecy and codes withstanding spoofing attacks of order L ≥ 2
    • Advances in Cryptology-Eurocrypt '90. Berlin, Germany: Springer-Verlag
    • B. Smeets, P. Vanroose, and Z.-X. Wan, "On the construction of authentication codes with secrecy and codes withstanding spoofing attacks of order L ≥ 2," in Advances in Cryptology-Eurocrypt '90 (Lecture Notes in Computer Science). Berlin, Germany: Springer-Verlag, 1990, vol. 473, pp. 306-312.
    • (1990) Lecture Notes in Computer Science , vol.473 , pp. 306-312
    • Smeets, B.1    Vanroose, P.2    Wan, Z.-X.3
  • 25
    • 0025212061 scopus 로고
    • The combinatorics of authentication and secrecy codes
    • D. R. Stinson, "The combinatorics of authentication and secrecy codes," J. Cryptol., vol. 2, pp. 23-49, 1990.
    • (1990) J. Cryptol. , vol.2 , pp. 23-49
    • Stinson, D.R.1
  • 26
    • 0000410707 scopus 로고
    • Universal hashing and authentication codes
    • _, "Universal hashing and authentication codes," Codes Cryptogr., vol. 4, pp. 369-380, 1994.
    • (1994) Codes Cryptogr. , vol.4 , pp. 369-380
  • 27
    • 0019572642 scopus 로고
    • New hash functions and their use in authentication and set equality
    • M. N. Wegman and J. L. Carter, "New hash functions and their use in authentication and set equality," J. Comput. Syst. Sci., vol. 22, pp. 265-279, 1981.
    • (1981) J. Comput. Syst. Sci. , vol.22 , pp. 265-279
    • Wegman, M.N.1    Carter, J.L.2
  • 28
    • 0034188404 scopus 로고    scopus 로고
    • Constructions of authentication codes from algebraic curves over finite fields
    • May
    • C. Xing, H. Wang, and K. Y. Lam, "Constructions of authentication codes from algebraic curves over finite fields," IEEE Trans. Inform. Theory, vol. 46, pp. 886-892, May 2000.
    • (2000) IEEE Trans. Inform. Theory , vol.46 , pp. 886-892
    • Xing, C.1    Wang, H.2    Lam, K.Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.