On A2-codes including arbiter's attacks
(1995) Workshop on the Theory and Application of Cryptographic Techniques EUROCRYPT'94 950. p.456-461- Abstract
- We comment on the work by R. Taylor presented at Euro-Crypt'94 (see this proceedings). We first extend some known results on authentication codes with arbitration to the case when protection against arbiter's attacks is provided. We give lower bounds on the secret key size for each participant and give a construction showing that these bounds are tight. These results improve upon previously known work and show that a claim in the aforementioned paper is wrong.
This work
Please use this url to cite or link to this publication:
https://lup.lub.lu.se/record/1157331
- author
- Johansson, Thomas
LU
and Smeets, Ben LU
- organization
- publishing date
- 1995
- type
- Chapter in Book/Report/Conference proceeding
- publication status
- published
- subject
- host publication
- Advances in Cryptology / Lecture Notes in Computer Science
- volume
- 950
- pages
- 456 - 461
- publisher
- Springer
- conference name
- Workshop on the Theory and Application of Cryptographic Techniques EUROCRYPT'94
- conference location
- Perugia, Italy
- conference dates
- 1994-05-09 - 1994-05-12
- external identifiers
-
- scopus:84948963315
- ISSN
- 0302-9743
- 1611-3349
- ISBN
- 978-3-540-60176-0
- DOI
- 10.1007/BFb0053463
- language
- English
- LU publication?
- yes
- id
- 9f4af78b-3614-467d-87f6-21ad620067c5 (old id 1157331)
- date added to LUP
- 2016-04-01 12:27:43
- date last changed
- 2025-01-02 18:45:59
@inproceedings{9f4af78b-3614-467d-87f6-21ad620067c5, abstract = {{We comment on the work by R. Taylor presented at Euro-Crypt'94 (see this proceedings). We first extend some known results on authentication codes with arbitration to the case when protection against arbiter's attacks is provided. We give lower bounds on the secret key size for each participant and give a construction showing that these bounds are tight. These results improve upon previously known work and show that a claim in the aforementioned paper is wrong. <br/><br> This work}}, author = {{Johansson, Thomas and Smeets, Ben}}, booktitle = {{Advances in Cryptology / Lecture Notes in Computer Science}}, isbn = {{978-3-540-60176-0}}, issn = {{0302-9743}}, language = {{eng}}, pages = {{456--461}}, publisher = {{Springer}}, title = {{On A2-codes including arbiter's attacks}}, url = {{http://dx.doi.org/10.1007/BFb0053463}}, doi = {{10.1007/BFb0053463}}, volume = {{950}}, year = {{1995}}, }