Authentication code with secrecy based on projective geometry
Prikladnaâ diskretnaâ matematika, no. 2 (2013), pp. 39-49.

Voir la notice de l'article provenant de la source Math-Net.Ru

An authentication code with the secrecy based on the projective geometry is proposed. It ensures the secure authentication and confidentiality for the equiprobable source of information.
Keywords: authentication code with secrecy, perfect cipher, projective geometry.
@article{PDM_2013_2_a4,
     author = {A. U. Zubov},
     title = {Authentication code with secrecy based on projective geometry},
     journal = {Prikladna\^a diskretna\^a matematika},
     pages = {39--49},
     publisher = {mathdoc},
     number = {2},
     year = {2013},
     language = {ru},
     url = {http://geodesic.mathdoc.fr/item/PDM_2013_2_a4/}
}
TY  - JOUR
AU  - A. U. Zubov
TI  - Authentication code with secrecy based on projective geometry
JO  - Prikladnaâ diskretnaâ matematika
PY  - 2013
SP  - 39
EP  - 49
IS  - 2
PB  - mathdoc
UR  - http://geodesic.mathdoc.fr/item/PDM_2013_2_a4/
LA  - ru
ID  - PDM_2013_2_a4
ER  - 
%0 Journal Article
%A A. U. Zubov
%T Authentication code with secrecy based on projective geometry
%J Prikladnaâ diskretnaâ matematika
%D 2013
%P 39-49
%N 2
%I mathdoc
%U http://geodesic.mathdoc.fr/item/PDM_2013_2_a4/
%G ru
%F PDM_2013_2_a4
A. U. Zubov. Authentication code with secrecy based on projective geometry. Prikladnaâ diskretnaâ matematika, no. 2 (2013), pp. 39-49. http://geodesic.mathdoc.fr/item/PDM_2013_2_a4/

[1] Zubov A. Yu., “K teoretiko-igrovomu podkhodu issledovaniya kodov autentifikatsii”, Diskretnaya matematika, 21:3 (2009), 45–72 | DOI | MR | Zbl

[2] Zubov A. Yu., “O vybore optimalnoi strategii dlya koda autentifikatsii s dvumya sostoyaniyami istochnika”, Diskretnaya matematika, 21:4 (2009), 135–147 | DOI | MR | Zbl

[3] Zubov A. Yu., Matematika kodov autentifikatsii, Gelios ARV, M., 2007

[4] Zubov A. Yu., “Pochti sovershennye shifry i kody autentifikatsii”, Prikladnaya diskretnaya matematika, 2011, no. 4(14), 28–33

[5] Casse L. R. A., Martin K. M., Wild P. R., “Bound and characterizations of authentication/ secrecy schemes”, Designs, Codes and Cryptography, 13 (1998), 107–129 | DOI | MR | Zbl

[6] Ding C., Tian X., “Three constructions of authentication codes with perfect secrecy”, Designs, Codes and Cryptography, 33 (2004), 227–239 | DOI | MR | Zbl

[7] Huber M., Authentication and secrecy codes for equiprobable source probability distributions, 2009, arXiv: 0904.0109

[8] Huber M., “Constructing optimal authentication codes with perfect multi-fold secrecy”, Proc. IEEE Int. Zurich Seminar on Communications, IZS (March 3–5, 2010), Zurich, 2010, 86–89

[9] Mitchell C. J., Piper C., Walker M., Wild P., “Authentication schemes, perfect local randomizers, perfect secrecy and secret sharing schemes”, Designs, Codes and Cryptography, 7 (1996), 101–110 | MR | Zbl

[10] Rees R., Stinson D. R., “Combinatorial characterizations of authentication codes. II”, Designs, Codes and Cryptography, 7 (1996), 239–259 | MR | Zbl

[11] Sgarro A., “An introduction to the theory of unconditional secrecy and authentication”, Geometries, Codes and Cryptography, CISM Courses and Lectures, 313, Springer Verlag, 1990, 131–160 | MR

[12] Saygi Z., Constructions of authentication codes, A thesis submitted to the Graduate School of Applied Mathematics of the METU, Ankara, 2007, 74 pp.

[13] Smeets B., Vanrose P., Wan C.-X., “On the constraction of authentication codes with secrecy and codes withstanding spoofing attack of order $L$”, Eurocrypt' 90, LNCS, 473, 1990, 307–312

[14] De Soete M., “Some constructions for authentication – secrecy codes”, Eurocrypt' 88, LNCS, 330, 1988, 57–75 | MR | Zbl

[15] De Soete M., “Authentication/secrecy codes”, Geometries, Codes and Cryptography, CISM Courses and Lectures, 313, Springer Verlag, 1990, 187–199 | MR

[16] Stinson D. R., “A construction for authentication secrecy codes from certain combinatorial designs”, Crypto' 87, LNCS, 293, 1988, 355–366 | MR | Zbl

[17] Stinson D. R., “The combinatorics of authentication and secrecy codes”, J. Cryptology, 2:1 (1990), 23–49 | DOI | MR | Zbl

[18] Van Tran T., “On the construction of authentication and secrecy codes”, Designs, Codes and Cryptography, 5 (1995), 269–280 | DOI | MR | Zbl

[19] Kholl M., Kombinatorika, IL, M., 1970

[20] Zubov A. Yu., Kriptograficheskie metody zaschity informatsii. Sovershennye shifry, Gelios ARV, M., 2005

[21] Sachkov V. N., Vvedenie v kombinatornye metody diskretnoi matematiki, MTsNMO, M., 2004

[22] Gilbert E., MacWilliams F. J., Sloane J. A., “Codes which detect deception”, Bell System Tech. J., 53 (1974), 405–424 | MR | Zbl