Skip to main content

Lund University Publications

LUND UNIVERSITY LIBRARIES

Further results on asymmetric authentication schemes

Johansson, Thomas LU orcid (1999) In Information and Computation 151(1-2). p.100-133
Abstract
This paper derives some further results on unconditionally secure asymmetric authentication schemes. It starts by giving a general framework for constructing A2-codes, identifying many known constructions as special cases. Then a full treatment of A3-codes (A2-codes protecting against arbiter's attacks) is given, including bounds on the parameters and optimal constructions. With these models as a basis, we proceed by giving constructions of general asymmetric authentication schemes, i.e., schemes protecting against specified arbitrary sets of participants collaborating in order to cheat someone else. As a consequence, we improve upon Chaum and Roijakkers interactive construction of unconditionally secure digital signatures and present a... (More)
This paper derives some further results on unconditionally secure asymmetric authentication schemes. It starts by giving a general framework for constructing A2-codes, identifying many known constructions as special cases. Then a full treatment of A3-codes (A2-codes protecting against arbiter's attacks) is given, including bounds on the parameters and optimal constructions. With these models as a basis, we proceed by giving constructions of general asymmetric authentication schemes, i.e., schemes protecting against specified arbitrary sets of participants collaborating in order to cheat someone else. As a consequence, we improve upon Chaum and Roijakkers interactive construction of unconditionally secure digital signatures and present a (noninteractive) construction in the form of a code. In addition, we also show a few bounds for this general model, proving the optimality of some constructions. (Less)
Please use this url to cite or link to this publication:
author
organization
publishing date
type
Contribution to journal
publication status
published
subject
in
Information and Computation
volume
151
issue
1-2
pages
100 - 133
publisher
Elsevier
external identifiers
  • scopus:0001925043
ISSN
1090-2651
DOI
10.1006/inco.1998.2767
language
English
LU publication?
yes
id
22e1b787-3fc5-4166-98ff-3d63cf07e0c9 (old id 1157126)
date added to LUP
2016-04-04 08:53:52
date last changed
2023-09-05 17:10:48
@article{22e1b787-3fc5-4166-98ff-3d63cf07e0c9,
  abstract     = {{This paper derives some further results on unconditionally secure asymmetric authentication schemes. It starts by giving a general framework for constructing A2-codes, identifying many known constructions as special cases. Then a full treatment of A3-codes (A2-codes protecting against arbiter's attacks) is given, including bounds on the parameters and optimal constructions. With these models as a basis, we proceed by giving constructions of general asymmetric authentication schemes, i.e., schemes protecting against specified arbitrary sets of participants collaborating in order to cheat someone else. As a consequence, we improve upon Chaum and Roijakkers interactive construction of unconditionally secure digital signatures and present a (noninteractive) construction in the form of a code. In addition, we also show a few bounds for this general model, proving the optimality of some constructions.}},
  author       = {{Johansson, Thomas}},
  issn         = {{1090-2651}},
  language     = {{eng}},
  number       = {{1-2}},
  pages        = {{100--133}},
  publisher    = {{Elsevier}},
  series       = {{Information and Computation}},
  title        = {{Further results on asymmetric authentication schemes}},
  url          = {{http://dx.doi.org/10.1006/inco.1998.2767}},
  doi          = {{10.1006/inco.1998.2767}},
  volume       = {{151}},
  year         = {{1999}},
}