Bounds on the probability of deception in multiple authentication
(1994) In IEEE Transactions on Information Theory 40(5). p.1586-1591- Abstract
- The frequently assumed "freshness" constraint on the source states in multiple authentication schemes is not necessary if one allows the encoding rule to change between subsequent transmissions. In the paper it is shown that the main existing lower bounds on the probabilities of successful attack on multiple authentication schemes also hold for this new setup. Furthermore, Stinson's (1988) bound for the substitution attack is strengthened
Please use this url to cite or link to this publication:
https://lup.lub.lu.se/record/2ffa55a0-333a-45c6-918e-4b6f2475349b
- author
- Smeets, Ben
LU
- organization
- publishing date
- 1994-09
- type
- Contribution to journal
- publication status
- published
- subject
- in
- IEEE Transactions on Information Theory
- volume
- 40
- issue
- 5
- pages
- 1586 - 1591
- publisher
- IEEE - Institute of Electrical and Electronics Engineers Inc.
- external identifiers
-
- scopus:0028514064
- ISSN
- 0018-9448
- DOI
- 10.1109/18.333871
- language
- English
- LU publication?
- yes
- id
- 2ffa55a0-333a-45c6-918e-4b6f2475349b
- date added to LUP
- 2021-11-05 01:12:41
- date last changed
- 2024-01-05 19:55:40
@article{2ffa55a0-333a-45c6-918e-4b6f2475349b, abstract = {{The frequently assumed "freshness" constraint on the source states in multiple authentication schemes is not necessary if one allows the encoding rule to change between subsequent transmissions. In the paper it is shown that the main existing lower bounds on the probabilities of successful attack on multiple authentication schemes also hold for this new setup. Furthermore, Stinson's (1988) bound for the substitution attack is strengthened}}, author = {{Smeets, Ben}}, issn = {{0018-9448}}, language = {{eng}}, number = {{5}}, pages = {{1586--1591}}, publisher = {{IEEE - Institute of Electrical and Electronics Engineers Inc.}}, series = {{IEEE Transactions on Information Theory}}, title = {{Bounds on the probability of deception in multiple authentication}}, url = {{http://dx.doi.org/10.1109/18.333871}}, doi = {{10.1109/18.333871}}, volume = {{40}}, year = {{1994}}, }