Proof of Correspondence between Keys and Encoding Maps in an Authentication Code

نویسندگان

  • Juan Carlos Ku-Cauich
  • Guillermo Morales-Luna
  • Horacio Tapia-Recillas
چکیده

Systematic authentication codes without secrecy were defined in [1]. In [2] two new systematic authentication codes based on the Gray map on a Galois ring are introduced with the purpose of optimally reducing the impersonation and substitution probabilities. The first code is another example of a previously constructed code using the Gray map on Galois rings and modules over these rings [3,4]. The second code generalises the construction in [3], on the assumption of the existence of an appropriate class of bent functions. For this code, the existence of the bijection between the key space and the set of encoding maps is proved in this paper in a rather long but exhaustive way.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A new security proof for FMNV continuous non-malleable encoding scheme

A non-malleable code is a variant of an encoding scheme which is resilient to tampering attacks. The main idea behind non-malleable coding is that the adversary should not be able to obtain any valuable information about the message. Non-malleable codes are used in tamper-resilient cryptography and protecting memories against tampering attacks. Many different types of non-malleability have alre...

متن کامل

A Mutual Authentication Method for Internet of Things

Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...

متن کامل

Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited

In Eurocrypt 2010, Fehr et al. proposed the first sender equivocable encryption scheme secure against chosen-ciphertext attack (NC-CCA) and proved that NC-CCA security implies security against selective opening chosen-ciphertext attack (SO-CCA). The NC-CCA security proof of the scheme relies on security against substitution attack of a new primitive, “cross-authentication code”. However, the se...

متن کامل

Process algebraic modeling of authentication protocols for analysis of parallel multi-session executions

Many security protocols have the aim of authenticating one agent acting as initiator to another agent acting as responder and vice versa. Sometimes, the authentication fails because of executing several parallel sessions of a protocol, and because an agent may play both the initiator and responder role in parallel sessions. We take advantage of the notion of transition systems to specify authen...

متن کامل

MATRIX VALUATION PSEUDO RING (MVPR) AND AN EXTENSION THEOREM OF MATRIX VALUATION

Let R be a ring and V be a matrix valuation on R. It is shown that, there exists a correspondence between matrix valuations on R and some special subsets ?(MVPR) of the set of all square matrices over R, analogous to the correspondence between invariant valuation rings and abelian valuation functions on a division ring. Furthermore, based on Malcolmson’s localization, an alternative proof for t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1703.08147  شماره 

صفحات  -

تاریخ انتشار 2017