Combinational constructions of splitting authentication codes with perfect secrecy
DOI10.1007/s10623-022-01092-6zbMath1497.94140OpenAlexW4293090401WikidataQ114849672 ScholiaQ114849672MaRDI QIDQ2673993
Miao Liang, Yanting Wang, Lijun Ji
Publication date: 22 September 2022
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10623-022-01092-6
group divisible designssplitting authentication codesrobust (2,2)-thresholdsplitting packing designs
Combinatorial aspects of block designs (05B05) Cryptography (94A60) Authentication, digital signatures and secret sharing (94A62) Combinatorial aspects of packing and covering (05B40)
Cites Work
- Some new classes of 2-fold optimal or perfect splitting authentication codes
- The combinatorics of authentication and secrecy codes
- New bounds and constructions for authentication/secrecy codes with splitting
- A new class of group divisible designs with block size three
- On a fallacious bound for authentication codes
- New combinatorial designs and their applications to authentication codes and secret sharing schemes.
- On the equivalence of authentication codes and robust (2, 2)-threshold schemes
- Existence of optimal strong partially balanced designs
- A new class of optimal 3-splitting authentication codes
- An existence theory for pairwise balanced designs. II: Structure of PBD- closed sets and the existence conjectures
- Authentication Theory/Coding Theory
- Optical orthogonal codes: design, analysis and applications
- Two new direct product‐type constructions for resolvable group‐divisible designs
- Group Divisible Designs with Block Size Four and Group Type for
- Splitting authentication codes with perfect secrecy: new results, constructions and connections with algebraic manipulation detection codes
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Combinational constructions of splitting authentication codes with perfect secrecy