Abstract
In this paper, we present three algebraic constructions of authentication codes with secrecy. The codes have simple algebraic structures and are easy to implement. They are asymptotically optimal with respect to certain bounds.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
E.F. Brickel, A few results in message authentication, Congressus Numerantium 43 (1984), 141–154.
L.R.A. Casse, K.M. martin, and P R. Wild, Bounds and characterizations of authentication/secrecy schemes, Designs, Codes and Cryptography 13 (1998), 107–129.
M. De Soete, Some constructions for authentication-secrecy codes, Advances in Cryptology — Eurocrypt’ 88, Lecture Notes in Comput. Sci., Vol. 330, Springer-Verlag, 1988, 57–76.
E. Gilbert, F.J. MacWilliams and N.J.A. Sloane, Codes which detect deception, Bell Systems Tech. J. 53 (1974), 405–424.
R. Lidl and H. Niederreiter, Finite Fields, Encyclopedia of Mathematics and Its Application 20, Cambridge University Press, Cambridge, 1997.
J. L. Massey, Cryptography — A selective survey, in Digital Communications (1986), 3–21.
C. Mitchell, M. Walker and P. Wild, The combinatorics of perfect authentication schemes, SIAM J. Disc. Math. 7 (1994), 102–107.
D. Pei, Information-theoretic bounds for authentication codes and block designs, J. Cryptography 8 (1995), 177–188.
R.S. Rees and D.R. Stinson, Combinatorial characterizations of authentication codes, Designs, Codes and Cryptography 7 (1996), 239–259.
U. Rosenbaum, A lower bound on authentication after having observed a sequence of messages, J. Cryptography 6 (1993), 135–156.
R. Safavi-Naini and L. Tombak, Authentication codes in plaintext and chosen-content attacks, Advances in Cryptology — Eurocrypt’ 94, Lecture Notes in Comput. Sci., Vol. 950 (1995), 254–265.
A. Sgarro, Information-theoretic bounds for authentication frauds, J. Computer Security 2 (1993), 53–63.
G.J. Simmons, Authentication theory/coding theory, Advances in Cryptology — Crypto’ 84, Lecture Notes in Comput. Sci., Vol. 196 (1984), 411–431.
D.R. Stinson, A construction for authentication/secrecy codes from certain combinatorial designs, J. Cryptography 1 (1988), 119–127.
D.R. Stinson and L. Teirlinck, A construction for authentication/secrecy codes from 3-homogeneous permutation groups, European J. Combin. 11 (1990), 73–79.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ding, C., Salomaa, A., Solé, P., Tian, X. (2003). Three Constructions of Authentication/Secrecy Codes. In: Fossorier, M., Høholdt, T., Poli, A. (eds) Applied Algebra, Algebraic Algorithms and Error-Correcting Codes. AAECC 2003. Lecture Notes in Computer Science, vol 2643. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44828-4_4
Download citation
DOI: https://doi.org/10.1007/3-540-44828-4_4
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-40111-7
Online ISBN: 978-3-540-44828-0
eBook Packages: Springer Book Archive