Information-Theoretically Secure Key-Insulated Multireceiver Authentication Codes
نویسندگان
چکیده
منابع مشابه
Bounds and Constructions for Multireceiver Authentication Codes
Multireceiver authentication codes allow one sender to construct an authenticated message for a group of receivers such that each receiver can verify authenticity of the received message. In this paper, we give a formal deenition of multireceiver authentication codes, derive information theoretic and combinatorial lower bounds on their performance and give new eecient constructions for such cod...
متن کاملTwo Constructions of Multireceiver Authentication Codes from Singular Symplectic Geometry over Finite Fields
Multireceiver authentication codes allow one sender to construct an authenticated message for a group of receivers such that each receiver can verify authenticity of the received message. In this paper, two constructions of multireceiver authentication codes from singular symplectic geometry over finite fields are given. The parameters and the probabilities of success for different types of dec...
متن کاملMultireceiver Authentication Codes: Models, Bounds, Constructions, and Extensions
Multireceiver authentication codes allow one sender to construct an authenticated message for a group of receivers such that each receiver can verify authenticity of the received message. In this paper, we give a formal dee-nition of multireceiver authentication codes, derive information theoretic and combinatorial lower bounds on their performance and give new eecient and exible constructions ...
متن کاملNew Results on Unconditionally Secure Multi-receiver Manual Authentication
Manual authentication is a recently proposed model of communication motivated by the settings where the only trusted infrastructure is a low bandwidth authenticated channel, possibly realized by the aid of a human, that connects the sender and the receiver who are otherwise connected through an insecure channel and do not have any shared key or public key infrastructure. A good example of such ...
متن کاملInformation Theoretically Secure Encryption with Almost Free Authentication
In cryptology, secure channels enable the exchange of messages in a confidential and authenticated manner. The literature of cryptology is rich with proposals and analysis that address the secure communication over public (insecure) channels. In this work, we propose an information theoretically secure direction for the construction of secure channels. First, we propose a method of achieving un...
متن کامل