Further Results on Asymmetric Authentication Schemes
نویسنده
چکیده
This paper derives some further results on unconditionally secure asym-metric authentication schemes. It starts by giving a general framework for constructing A 2-codes, identifying many known constructions as special cases. Then a full treatment of A 3-codes (A 2-codes protecting against arbiter's attacks) is given, including bounds on the parameters and optimal constructions. With these models as a basis, we proceed by giving constructions of general asymmetric authentication schemes, i.e., schemes protecting against speciied arbitrary sets of participants collaborating in order to cheat someone else. As a consequence, we improve upon Chaum and Roijakkers interactive construction of unconditionally secure digital signatures Chaum and Roijakkers 1990], and present a (non-interactive) construction in the form of a code. In addition, we also show a few bounds for this general model, proving the optimality of some constructions.
منابع مشابه
Enhancing privacy of recent authentication schemes for low-cost RFID systems
Nowadays Radio Frequency Identification (RFID) systems have appeared in lots of identification and authentication applications. In some sensitive applications, providing secure and confidential communication is very important for end-users. To this aim, different RFID authentication protocols have been proposed, which have tried to provide security and privacy of RFID users. In this paper, we a...
متن کاملImage authentication using LBP-based perceptual image hashing
Feature extraction is a main step in all perceptual image hashing schemes in which robust features will led to better results in perceptual robustness. Simplicity, discriminative power, computational efficiency and robustness to illumination changes are counted as distinguished properties of Local Binary Pattern features. In this paper, we investigate the use of local binary patterns for percep...
متن کاملA Mutual Authentication Method for Internet of Things
Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...
متن کاملHidden Field Equations (HFE) and Isomorphisms of Polynomials (IP): two new Families of Asymmetric Algorithms
In [11] T. Matsumoto and H. Imai described a new asymmetric algorithm based on multivariate polynomials of degree two over a nite eld. Then in [14] this algorithm was broken. The aim of this paper is to show that despite this result it is probably possible to use multivariate polynomials of degree two in carefully designed algorithms for asymmetric cryptography. In this paper we will give some ...
متن کاملCoupon Recalculation for the Schnorr and GPS Identification Scheme: A Performance Evaluation
One of the most important challenges in the last few years has been the integration of authentication services to low-cost RFID tags. Especially elliptic-curve-based implementations have proven to be a good option for asymmetric and light-weight cryptography. In this article, we evaluate two elliptic-curve based versions of the Schnorr and GPS identification schemes that have been designed for ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Inf. Comput.
دوره 151 شماره
صفحات -
تاریخ انتشار 1999