Splitting authentication codes with perfect secrecy: new results, constructions and connections with algebraic manipulation detection codes
From MaRDI portal
Publication:6047434
DOI10.3934/amc.2021054zbMath1520.05019arXiv2104.11076OpenAlexW3164807225MaRDI QIDQ6047434
Maura B. Paterson, Douglas R. Stinson
Publication date: 12 September 2023
Published in: Advances in Mathematics of Communications (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/2104.11076
Combinatorial aspects of block designs (05B05) Cryptography (94A60) Combinatorial aspects of difference sets (number-theoretic, group-theoretic, etc.) (05B10)
Related Items (2)
Combinational constructions of splitting authentication codes with perfect secrecy ⋮ Local balance in graph decompositions
Cites Work
- Unnamed Item
- Combinatorial characterizations of algebraic manipulation detection codes involving generalized difference families
- The combinatorics of authentication and secrecy codes
- Further results on the existence of splitting BIBDs and application to authentication codes
- Some constructions and bounds for authentication codes
- New bounds and constructions for authentication/secrecy codes with splitting
- A new class of group divisible designs with block size three
- Group divisible designs with block-size four
- On a fallacious bound for authentication codes
- New combinatorial designs and their applications to authentication codes and secret sharing schemes.
- Group divisible designs with block size four and group type \(g^{u} m^{1}\) for small \(g\)
- On the equivalence of authentication codes and robust (2, 2)-threshold schemes
- Local balance in graph decompositions
- A new class of optimal 3-splitting authentication codes
- Authentication Theory/Coding Theory
- Combinatorial Constructions for Optimal Splitting Authentication Codes
- Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors
This page was built for publication: Splitting authentication codes with perfect secrecy: new results, constructions and connections with algebraic manipulation detection codes