Further results on asymmetric authentication schemes
(1999) In Information and Computation 151(1-2). p.100-133- Abstract
- This paper derives some further results on unconditionally secure asymmetric authentication schemes. It starts by giving a general framework for constructing A2-codes, identifying many known constructions as special cases. Then a full treatment of A3-codes (A2-codes protecting against arbiter's attacks) is given, including bounds on the parameters and optimal constructions. With these models as a basis, we proceed by giving constructions of general asymmetric authentication schemes, i.e., schemes protecting against specified arbitrary sets of participants collaborating in order to cheat someone else. As a consequence, we improve upon Chaum and Roijakkers interactive construction of unconditionally secure digital signatures and present a... (More)
- This paper derives some further results on unconditionally secure asymmetric authentication schemes. It starts by giving a general framework for constructing A2-codes, identifying many known constructions as special cases. Then a full treatment of A3-codes (A2-codes protecting against arbiter's attacks) is given, including bounds on the parameters and optimal constructions. With these models as a basis, we proceed by giving constructions of general asymmetric authentication schemes, i.e., schemes protecting against specified arbitrary sets of participants collaborating in order to cheat someone else. As a consequence, we improve upon Chaum and Roijakkers interactive construction of unconditionally secure digital signatures and present a (noninteractive) construction in the form of a code. In addition, we also show a few bounds for this general model, proving the optimality of some constructions. (Less)
Please use this url to cite or link to this publication:
https://lup.lub.lu.se/record/1157126
- author
- Johansson, Thomas LU
- organization
- publishing date
- 1999
- type
- Contribution to journal
- publication status
- published
- subject
- in
- Information and Computation
- volume
- 151
- issue
- 1-2
- pages
- 100 - 133
- publisher
- Elsevier
- external identifiers
-
- scopus:0001925043
- ISSN
- 1090-2651
- DOI
- 10.1006/inco.1998.2767
- language
- English
- LU publication?
- yes
- id
- 22e1b787-3fc5-4166-98ff-3d63cf07e0c9 (old id 1157126)
- date added to LUP
- 2016-04-04 08:53:52
- date last changed
- 2023-09-05 17:10:48
@article{22e1b787-3fc5-4166-98ff-3d63cf07e0c9, abstract = {{This paper derives some further results on unconditionally secure asymmetric authentication schemes. It starts by giving a general framework for constructing A2-codes, identifying many known constructions as special cases. Then a full treatment of A3-codes (A2-codes protecting against arbiter's attacks) is given, including bounds on the parameters and optimal constructions. With these models as a basis, we proceed by giving constructions of general asymmetric authentication schemes, i.e., schemes protecting against specified arbitrary sets of participants collaborating in order to cheat someone else. As a consequence, we improve upon Chaum and Roijakkers interactive construction of unconditionally secure digital signatures and present a (noninteractive) construction in the form of a code. In addition, we also show a few bounds for this general model, proving the optimality of some constructions.}}, author = {{Johansson, Thomas}}, issn = {{1090-2651}}, language = {{eng}}, number = {{1-2}}, pages = {{100--133}}, publisher = {{Elsevier}}, series = {{Information and Computation}}, title = {{Further results on asymmetric authentication schemes}}, url = {{http://dx.doi.org/10.1006/inco.1998.2767}}, doi = {{10.1006/inco.1998.2767}}, volume = {{151}}, year = {{1999}}, }