[14, 177]): Is it possible to give combinatorial characterizations as well as constructions of optimal codes (with and without secrecy requirements)? We study authentication codes with splitting in this section. In such a code, ...
AUTHENTICATION WITHOUT SECRECY Superficially, the problem resembles the "authentication without secrecy" problem discussed by the author in a series of earlier papers [1, 2, 3]. While it is true that the prisoners (transmitter/receiver) ...
We first note that the total effective equivocation to the opponent playing the substitution game but without knowledge of the source state, i.e., authentication with secrecy, is no greater than H(E|M) and as remarked earlier, ...
between different units in a military organization often need both secrecy and authentication. Let us look at an example of authentication without secrecy. A company that owns a lot of parking meters has an employee who collects the ...
Authentication codes with splitting The term splitting refers to the situation where there can be more than one ... In the case of authentication without secrecy, it can be shown that Pd, Z 1/ [Al for 0 3 i 3 t (see, for example, [63]).
In this paper, we present two classes of optimal authentication codes without secrecy from difference balanced functions. The new codes are as good as or have more flexible parameters than the optimal codes from perfect nonlinear ...
Since we wish to use the problem of authenticating seismic data to verify compliance with a comprehensive nuclear weapons test ... The obvious solution to the authentication without secrecy problem exploits the authentication channel.
not necessary the secrecy. This part corresponds to the area of Authentication Without Secrecy (or AWS). An authentication code without secrecy is a code where an observed message can correspond to a unique source state.
Traditionally, it was assumed that a secrecy system provides authentication by the virtue of the secret key being only known to the intended ... Similarly, a system can provide perfect authentication without concealing messages.
Authentication without Secrecy The three participants are again Alice , Bob , and Oscar . Suppose that Oscar has the ability to introduce his own messages into the channel and / or to modify existing messages .