Some Remarks on Authentication Systems
نویسندگان
چکیده
Brickell, Simmons and others have discussed doubly perfect authentication systems in which an opponent's chance of deceiving the receiver is a minimum for a given number of encoding rules. Brickell has shown that in some instances to achieve this minimum the system needs to have splitting. Such a system uses a larger message space. Motivated by Brickell's ideas we consider authentication systems with splitting and the problems of reducing the message space. Disciplines Physical Sciences and Mathematics Publication Details Anthony, MHG, Martin, KM, Seberry, J & Wild, P, Some remarks on authentication systems, ( Josef Pieprzyk and Jennifer Seberry, (Eds.)), Auscrypt'90 – Advances in Cryptography, 453, Lecture Notes in Computer Science, Springer-Verlag, 1990, 122-139. This journal article is available at Research Online: http://ro.uow.edu.au/infopapers/1046 Some Remarks on Authentication Systems Martin H.G. Anthony', Keith M. Martin', Jennifer Seberry", Peter Wild' Abstract Brickell, Simmons and others have discussed doubly perfect authentication systems in which an opponent's chance of deceiving the receiver is a minimum for a given number of encoding rules. Brickell has shown that in some instances to achieve this minimum the system needs to have splitting. Such a system uses a larger message space. Motivated by Brickell's ideas we consider authentication systems with splitting and the problems of reducing the message space.Brickell, Simmons and others have discussed doubly perfect authentication systems in which an opponent's chance of deceiving the receiver is a minimum for a given number of encoding rules. Brickell has shown that in some instances to achieve this minimum the system needs to have splitting. Such a system uses a larger message space. Motivated by Brickell's ideas we consider authentication systems with splitting and the problems of reducing the message space.
منابع مشابه
SOME REMARKS ON ALMOST UNISERIAL RINGS AND MODULES
In this paper we study almost uniserial rings and modules. An R−module M is called almost uniserial if any two nonisomorphic submodules are linearly ordered by inclusion. A ring R is an almost left uniserial ring if R_R is almost uniserial. We give some necessary and sufficient condition for an Artinian ring to be almost left uniserial.
متن کاملEnhancing privacy of recent authentication schemes for low-cost RFID systems
Nowadays Radio Frequency Identification (RFID) systems have appeared in lots of identification and authentication applications. In some sensitive applications, providing secure and confidential communication is very important for end-users. To this aim, different RFID authentication protocols have been proposed, which have tried to provide security and privacy of RFID users. In this paper, we a...
متن کاملSOME REMARKS ON GENERALIZATIONS OF MULTIPLICATIVELY CLOSED SUBSETS
Let R be a commutative ring with identity and Mbe a unitary R-module. In this paper we generalize the conceptmultiplicatively closed subset of R and we study some propertiesof these genaralized subsets of M. Among the many results in thispaper, we generalize some well-known theorems about multiplicativelyclosed subsets of R to these generalized subsets of M. Alsowe show that some other well-kno...
متن کاملSome Remarks on Generalized Sequence Space of Bounded Variation of Sequences of Fuzzy Numbers
The idea of difference sequences of real (or complex) numbers was introducedby Ki zmaz cite{Kizmaz}. In this paper, using the difference operator and alacunary sequence, we introduce and examine the class of sequence $bv_{theta}left( Delta,mathcal{F}right) .$ We study some of its properties likesolidity, symmetricity, etc.
متن کاملHMAC-Based Authentication Protocol: Attacks and Improvements
As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...
متن کامل