多接收多重认证码的有关边界和构造
bounds and construction for multiple authentication codes with multi-receiver
-
摘要: 该文讨论了在一个发送者、多个接收者、多重认证码中、内部欺骗者的联合实施模仿攻击和替代攻击成功概率的下界。说明了对多接收多重认证门限体制,要使它达到某一安全水平,发送者和各接收者必须掌握的最小密钥量,并给出一种具体构造方法。
-
关键词:
- 多接收多重认证码; 密钥; 门限体制
Abstract: This paper discusses the bounds on the probability of success in impersonation and substitution attack by malicious groups of receivers for multiple authentication codes with multi-receiver, and gives out the least-size of the secret key space that the sender and the receivers must have in hand to ensure the multiple authertication codes with multi-receiver being under security level and presents also its construting method. -
马文平,王新梅,多发送认证码的几个新构造方法,电子学报,2000,28(4),117-119.[2]R. Safvi-Naini, H. Wang, Multi-receiver authentication codes: models, bounds, constructions and extensions, Information and Computation, 1999, 151(1), 148-172.[3]Wakaha Ogata, Kaoru Kurosawa, Optimum secret sharing scheme secure against cheating, Advances in Cryptology-EUROCRYPT96, Lecture Notes in Computer Science, Springer-Verlag Heidelberg, 1996, Vol.1070, 200 211.[4]M. Atici.[J].D. R. Stinson, Universal hashing and multiple authentication. Advances in CryptologyCRYPTO96, Lecture Notes in Computer Science, New York, Springer, vol.110.1996,:-[5]Y. Desmedt.[J].Society and group oriented cryptography: A new concept, Advances in CryptologyCrypto87, Lecture Notes in Computer Science, Springer-Verlag, vol.57.1991,:-
计量
- 文章访问数: 2102
- HTML全文浏览量: 111
- PDF下载量: 574
- 被引次数: 0