Abstract
Simmons (1990) has introduced an extended authentication model where caution is taken both against deceptions from an outsider (opponent) and against some forms of deception from the insiders (transmitter and receiver). Codes for this model are called authentication codes with arbitration, or simply A2 codes. A new construction of authentication codes with arbitration is proposed, which uses codes for the rank metric
Original language | English |
---|---|
Title of host publication | [Host publication title missing] |
Pages | 492 |
DOIs | |
Publication status | Published - 1994 |
Event | IEEE International Symposium on Information Theory (ISIT), 1994 - Trondheim, Norway Duration: 1994 Jun 27 → 1994 Jul 1 |
Conference
Conference | IEEE International Symposium on Information Theory (ISIT), 1994 |
---|---|
Country/Territory | Norway |
City | Trondheim |
Period | 1994/06/27 → 1994/07/01 |
Subject classification (UKÄ)
- Electrical Engineering, Electronic Engineering, Information Engineering