Advanced Search
Volume 19 Issue 4
Jul.  1997
Turn off MathJax
Article Contents
Zhou Zhi, Hu Zhengming. THE CONSTRUCTIONS OF A2-CODES FROM CONVENTIONAL A-CODES[J]. Journal of Electronics & Information Technology, 1997, 19(4): 489-493.
Citation: Zhou Zhi, Hu Zhengming. THE CONSTRUCTIONS OF A2-CODES FROM CONVENTIONAL A-CODES[J]. Journal of Electronics & Information Technology, 1997, 19(4): 489-493.

THE CONSTRUCTIONS OF A2-CODES FROM CONVENTIONAL A-CODES

  • Received Date: 1995-09-29
  • Rev Recd Date: 1996-07-10
  • Publish Date: 1997-07-19
  • Using the secret-sharing schemes, especialy the (k,n)-threshold schemes as tools, one method of constructing A2-Code from the general A-Code was given. It was shown that the new codes have all the good properties of the old ones, such as the known information-theoretical and combinatorial bounds of the latters, although asking for some data bits extension. Clearly, this method shows a new dimension of how to design the secret and efficient A2-code.
  • loading
  • Gilbert E, MacWillams F, Sloane N. Codes which detect deceptions. Bell Sys. Tech. J.,1974, 53(3): 405-424.[2]Simmons G J. Authentication Theory/Coding Theory. In Advances in Cryptology-Crypt84, New York, NY, USA: 1984, 411-431.[3]裴定一.认证码及其构造的一些研究.CHINACRYPT 92,北京,1992,66-73.[4]Simmons G J. Message authentication with arbitration of transmmiter/receiver disputes. Eurocrypt 87, Norway: 1987, 151-161.[5]Stinson D R, et al. Authentication Codes with Multiple Arbiters. Eurocrypt 88, Denmark: 1988, 51-55.[6]Desmat Y, Moti Y. Arbitrated unconditionally secure authentication can be unconditionally protected against arbiters attacks. Crypt90, California, USA: 1990, 179-193.[7]Taylor R. Near optimal unconditionaVy secure suthentications. Eurocrypt 94, Italy: 1994, 245-255.[8]Shamir A, Riverst R L, Adleman L M. Mental Poker In the Mathematical Gardner, ed. D Klarner, Prindle, Weber Schmidt, Boston, Mass: 1980.[9]Shamir A. How to share a secret, Comm[J].of the ACM.1979, 22(4):612-613[10]Asmuth C. A modular approach to key safeguarding. IEEE Trans. on IT, 1983, IT-29(2): 208-210.[11]王新梅.级连码(k, n)门限通信密钥分散保管方案.通信学报,1987, 8(4): 1-9.[12]Cao Z F. Finite set theory and its applications to cryptology. In Designs, Codes and Finite Geometries, Shanghai Conference, Shanghai: May, 24-28, 1993, 9-10.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (1970) PDF downloads(376) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return