Access the full text.
Sign up today, get DeepDyve free for 14 days.
Y. Desmedt, M. Yung (1990)
Arbitrated unconditionally secure authentication can be unconditionally protected against arbiter’s attacksAdvances in Cryptology. Proceedings of CRYPT’90, 537
(1997)
The constructions of A2-codes from conventional A-codes
G. You, HU Liqun (2011)
A New Construction of the Authentication Codes with Arbitration from Singular Symplectic Geometry over the Finite FieldsChinese Journal of Engineering Mathematics, 28
Shang-di Chen, Dawei Zhao (2013)
Two constructions of optimal cartesian authentication codes from unitary geometry over finite fieldsActa Mathematicae Applicatae Sinica, English Series, 29
(1993)
Secret sharing schemes and linear block codes
T. Johansson (1999)
Further Results on Asymmetric Authentication SchemesInf. Comput., 151
T. Johansson (1993)
Lower Bounds on the Probability of Deception in Authentication with ArbitrationProceedings. IEEE International Symposium on Information Theory
G. Simmons (1987)
Message Authentication with Arbitration of Transmitter/Receiver Disputes
T. Johansson (1994)
Lower bounds on the probability of deception in authentication with arbitrationIEEE Transcations on Information Theory, 40
Shang-di Chen, Dawei Zhao (2013)
New Construction of Authentication Codes with Arbitration from Pseudo-Symplectic Geometry over Finite FieldsArXiv, abs/1305.6175
Yejing Wang, R. Safavi-Naini (1999)
A3-Codes under Collusion Attacks
A. Shamir (1979)
How to share a secretCommun. ACM, 22
Chen Shangdi, Z. Dawei (2011)
Two Constructions of Multireceiver Authentication Codes from Symplectic Geometry over Finite FieldsArs Comb., 99
(1990)
Arbitrated unconditionally secure authentication can be unconditionally protected against arbiter’s attacks. Advances in Cryptology
Shang-di Chen, Dawei Zhao (2013)
Construction of Multi-receiver Multi-fold Authentication Codes from Singular Symplectic Geometry over Finite FieldsAlgebra Colloquium, 20
Zhao Da-wei (2011)
Construction of Authentication Codes with Arbitration over Symplectic GeometryJournal of Civil Aviation University of China
Y. Gao, X.H. Shi, H.L. Wang (2008)
Construction of authentication codes with arbitration from singular symplectic geometry over finite fieldsActa Scientiarum Naturalium Universitatias Nankaiensis, 41
(1996)
Authentication code with multiple arbiters
Huo Li-qun (2010)
New Construction of Authentication Codes with Arbitration from Singular Symplectic GeometryJournal of Civil Aviation University of China
R. Safavi-Naini, Y. Wang (1999)
Proc. of Asiacrypt’99, LNCS 1716
G.J. Simmons (1987)
Proceedings of Crypto’87, Lecture Notes in Computer Science 304
Hongli Wang (2015)
Construction of Authentication Codes with Arbitration from Singular Symplectic GeometryArs Comb., 120
(2002)
Geometry of Classical Groups over Finite Fields (Second Edition)
In a common authentication code with arbitration, the dishonest arbiter may make a threat to the security of authentication system. In this paper, an authentication code with double arbiters over symplectic geometry is constructed, and the relevant parameters and the probabilities of successful attacks are calculated. The model not only prevents deception from the opponent and members of the system, but also effectively limits the attacks of single arbiter. Moreover, the collusion attacks from arbiters and participators are difficult to succeed.
Acta Mathematicae Applicatae Sinica – Springer Journals
Published: Nov 3, 2015
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.