Abstract
The frequently assumed "freshness" constraint on the source states in multiple authentication schemes is not necessary if one allows the encoding rule to change between subsequent transmissions. In the paper it is shown that the main existing lower bounds on the probabilities of successful attack on multiple authentication schemes also hold for this new setup. Furthermore, Stinson's (1988) bound for the substitution attack is strengthened
Original language | English |
---|---|
Pages (from-to) | 1586 - 1591 |
Journal | IEEE Transactions on Information Theory |
Volume | 40 |
Issue number | 5 |
DOIs | |
Publication status | Published - 1994 Sept |
Subject classification (UKÄ)
- Telecommunications
- Communication Systems