Another Construction of Cartesian Authentication Codes from Geometry of Clasical Groups

被引:6
|
作者
Feng Rongquan (School of Mathematical Sciences
机构
关键词
Authentication Code; Finite Field; Symplectic Group; Unitary Group; Orthogonal Group; Pesudo symplectic Group;
D O I
10.13447/j.1674-5647.1999.01.016
中图分类号
O152.3 [线性群论];
学科分类号
070104 ;
摘要
§1.IntroductionLetS,EandMbethreenon-emptysetsandletf:S×E→Mbeamap.Thefourtuple(S,E,M;f)iscaledanauthenticationcode(see[1]),if(...
引用
收藏
页码:103 / 114
页数:12
相关论文
共 31 条
  • [21] A construction of authentication codes with arbitration based on orthogonal spaces
    BOUBACAR ABBA
    游宏
    Journal of Harbin Institute of Technology(New series), 2006, (02) : 134 - 140
  • [22] Homomorphic Linear Authentication Schemes from ε-Authentication Codes
    Han, Shuai
    Liu, Shengli
    Zhang, Fangguo
    Chen, Kefei
    ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 487 - 498
  • [23] Using Normal Form of Nilpotent Matrices over Finite Fields to Construct Cartesian Authentication Codes
    赵辉芳
    秦德生
    Northeastern Mathematical Journal, 2004, (04) : 415 - 423
  • [24] Authentication Codes from Error-Correcting Codes; An Overview
    van Tilborg, Henk
    ENHANCING CRYPTOGRAPHIC PRIMITIVES WITH TECHNIQUES FROM ERROR CORRECTING CODES, 2009, 23 : 3 - 16
  • [25] AUTHENTICATION CODES FROM DIFFERENCE BALANCED FUNCTIONS
    Yang, Yang
    Tang, Xiaohu
    Parampalli, Udaya
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2011, 22 (06) : 1417 - 1429
  • [26] A TWOOA construction for multi-receiver multi-message authentication codes
    Fuji-Hara, Ryoh
    Li, Xiyang
    Miao, Ying
    Wu, Dianhua
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2008, 2 (01) : 9 - 28
  • [27] Optimal Authentication Codes from Difference Balanced Functions
    Yang, Yang
    Tang, Xiaohu
    Parampalli, Udaya
    SEQUENCES AND THEIR APPLICATIONS-SETA 2010, 2010, 6338 : 298 - +
  • [28] Construction of Perfect Authentication Codes with Distrust Arbitration Based on Matrices over Finite Fields
    Wu, Zhouting
    Chen, Shangdi
    Wang, Junnan
    Yu, Che
    ARS COMBINATORIA, 2019, 144 : 225 - 235
  • [29] Authentication Codes from ε-ASU Hash Functions with Partially Secret Keys
    Liu Shengli
    Tilborg, Henk van
    Weng Jian
    Chen Kefei
    CHINESE JOURNAL OF ELECTRONICS, 2014, 23 (04) : 790 - 793
  • [30] Constructions of authentication codes from algebraic curves over finite fields
    Xing, CP
    Wang, HX
    Lam, KY
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2000, 46 (03) : 886 - 892