Authentication schemes, perfect local randomizers, perfect secrecy and secret sharing schemes (Q1910425): Difference between revisions

From MaRDI portal
RedirectionBot (talk | contribs)
Removed claim: reviewed by (P1447): Item:Q590994
Set OpenAlex properties.
 
(3 intermediate revisions by 3 users not shown)
Property / reviewed by
 
Property / reviewed by: G. Eigenthaler / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / cites work
 
Property / cites work: Some improved bounds on the information rate of perfect secret sharing schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Codes Which Detect Deception / rank
 
Normal rank
Property / cites work
 
Property / cites work: Key-minimal cryptosystems for unconditional secrecy / rank
 
Normal rank
Property / cites work
 
Property / cites work: Local randomness in pseudorandom sequences / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Combinatorics of Perfect Authentication Schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: A lower bound on authentication after having observed a sequence of messages / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to share a secret / rank
 
Normal rank
Property / cites work
 
Property / cites work: Communication Theory of Secrecy Systems* / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3495231 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4853712 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Information-theoretic bounds for authentication schemes / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/bf00125078 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2020220799 / rank
 
Normal rank

Latest revision as of 09:51, 30 July 2024

scientific article
Language Label Description Also known as
English
Authentication schemes, perfect local randomizers, perfect secrecy and secret sharing schemes
scientific article

    Statements

    Authentication schemes, perfect local randomizers, perfect secrecy and secret sharing schemes (English)
    0 references
    0 references
    30 June 1997
    0 references
    Shannon showed in his classic theory that if a cipher system provides perfect secrecy the number of keys is greater than the number of messages. In the 1980's Simmons developed the theory of authentication, relating the size of the key space to the probability of deception. In 1990 \textit{M. Walker} [J. Cryptology 2, No. 3, 131-143 (1990; Zbl 0705.94008)] gave information-theoretic bounds relating the entropy of the key space to the probability of deception for cartesian authentication schemes. This paper shows how to apply Walker's result to other cryptographic concepts such as perfect local randomness in pseudo-random sequences, perfect secrecy against known plaintext attacks on block ciphers, and secret sharing schemes. When Walker's bounds are met, the probability of success of an eavesdropper or spoofer is reduced to guessing the key stream or the authentic encoded messages. Applying bounds of Walker on authentication schemes, a bound on the number of keys required of a block cipher providing perfect secrecy against known plaintext attacks is given. Finally, a relationship between secret sharing schemes and authentication schemes is established.
    0 references
    authentication
    0 references
    pseudo-random sequences
    0 references
    block ciphers
    0 references
    secret sharing schemes
    0 references

    Identifiers