Authentication codes for non-trusting parties obtained from rank metric codes

Research output: Contribution to journalArticlepeer-review

Abstract

In this paper we introduce a new way of constructingA 2-codes, i.e., authentication codes that protect against deceptions from an opponent and additionally also protect against deceptions from the transmitter and the receiver. The construction uses codes for the rank metric, a well-known field in coding theory. The construction gives improved performance compared with previous work and it also gives an opportunity to use unequal authentication protection when the participants are unequally trusted.
Original languageEnglish
Pages (from-to)205-218
JournalDesigns, Codes and Cryptography
Volume6
Issue number3
DOIs
Publication statusPublished - 1995

Subject classification (UKÄ)

  • Electrical Engineering, Electronic Engineering, Information Engineering

Fingerprint

Dive into the research topics of 'Authentication codes for non-trusting parties obtained from rank metric codes'. Together they form a unique fingerprint.

Cite this