Abstract
We present an analysis of some known cartesian authentication codes and their modification into authentication codes with secrecy, with transmission rate R = r/n, where n = 2, 3, …, and 1 ≤ r ≤ n - 1 using (n - r)(r + 1) q-ary key digits. For this purpose we use a grouping technique. Essentially the same key grouping technique is used for the construction of codes that withstand spoofing attacks of order L ≥ 2. The information rate of this scheme is also r/n, and it requires (L + r)(n - r) q-ary key digits. Moreover these codes allow that previously transmitted source states can be reused.
| Original language | English |
|---|---|
| Title of host publication | Advances in Cryptology — EUROCRYPT 1990 |
| Subtitle of host publication | Workshop on the Theory and Application of Cryptographic Techniques, Proceedings |
| Editors | Ivan Bjerre Damgard |
| Publisher | Springer |
| Pages | 306-312 |
| Number of pages | 7 |
| ISBN (Electronic) | 9783540468776 |
| ISBN (Print) | 9783540535874 |
| DOIs | |
| Publication status | Published - 1991 |
| Event | Conference on the Theory and Application of Cryptology, 1990 - Aarhus, Denmark Duration: 1990 May 21 → 1990 May 24 |
Publication series
| Name | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
|---|---|
| Volume | 473 LNCS |
| ISSN (Print) | 0302-9743 |
| ISSN (Electronic) | 1611-3349 |
Conference
| Conference | Conference on the Theory and Application of Cryptology, 1990 |
|---|---|
| Country/Territory | Denmark |
| City | Aarhus |
| Period | 1990/05/21 → 1990/05/24 |
Bibliographical note
Publisher Copyright:© Springer-Verlag Berlin Heidelberg 1991.
Subject classification (UKÄ)
- Telecommunications