Bounds And Constructions For Threshold Shared Generation Of Authenticators
From MaRDI portal
Publication:4792963
DOI10.1080/00207160214648zbMath1022.94014OpenAlexW1964807217MaRDI QIDQ4792963
Huaxiong Wang, Reihaneh Safavi-Naini
Publication date: 21 October 2003
Published in: International Journal of Computer Mathematics (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1080/00207160214648
cryptanalysisauthentication codesperfect hash familiesdistributed authenticationSGA-systemsshared generation of authenticatorsthreshold authentication codes
Linear codes (general theory) (94B05) Bounds on codes (94B65) Authentication, digital signatures and secret sharing (94A62)
Cites Work
- Unnamed Item
- Unnamed Item
- The combinatorics of authentication and secrecy codes
- An explication of secret sharing schemes
- Unconditionally secure group authentication
- A shift register construction of unconditionally secure authentication codes
- Perfect hashing
- Derandomization, witnesses for Boolean matrix multiplication and construction of perfect hash functions
- Efficient Multiplicative Sharing Schemes
- How to share a secret
- Codes Which Detect Deception
- On secret sharing systems
This page was built for publication: Bounds And Constructions For Threshold Shared Generation Of Authenticators