Skip to main content

Lund University Publications

LUND UNIVERSITY LIBRARIES

Bounds on the probability of deception in multiple authentication

Smeets, Ben LU orcid (1994) In IEEE Transactions on Information Theory 40(5). p.1586-1591
Abstract
The frequently assumed "freshness" constraint on the source states in multiple authentication schemes is not necessary if one allows the encoding rule to change between subsequent transmissions. In the paper it is shown that the main existing lower bounds on the probabilities of successful attack on multiple authentication schemes also hold for this new setup. Furthermore, Stinson's (1988) bound for the substitution attack is strengthened
Please use this url to cite or link to this publication:
author
organization
publishing date
type
Contribution to journal
publication status
published
subject
in
IEEE Transactions on Information Theory
volume
40
issue
5
pages
1586 - 1591
publisher
IEEE - Institute of Electrical and Electronics Engineers Inc.
external identifiers
  • scopus:0028514064
ISSN
0018-9448
DOI
10.1109/18.333871
language
English
LU publication?
yes
id
2ffa55a0-333a-45c6-918e-4b6f2475349b
date added to LUP
2021-11-05 01:12:41
date last changed
2024-01-05 19:55:40
@article{2ffa55a0-333a-45c6-918e-4b6f2475349b,
  abstract     = {{The frequently assumed "freshness" constraint on the source states in multiple authentication schemes is not necessary if one allows the encoding rule to change between subsequent transmissions. In the paper it is shown that the main existing lower bounds on the probabilities of successful attack on multiple authentication schemes also hold for this new setup. Furthermore, Stinson's (1988) bound for the substitution attack is strengthened}},
  author       = {{Smeets, Ben}},
  issn         = {{0018-9448}},
  language     = {{eng}},
  number       = {{5}},
  pages        = {{1586--1591}},
  publisher    = {{IEEE - Institute of Electrical and Electronics Engineers Inc.}},
  series       = {{IEEE Transactions on Information Theory}},
  title        = {{Bounds on the probability of deception in multiple authentication}},
  url          = {{http://dx.doi.org/10.1109/18.333871}},
  doi          = {{10.1109/18.333871}},
  volume       = {{40}},
  year         = {{1994}},
}