Skip to main content
Log in

Unconditionally Secure Group Authentication

  • Published:
Designs, Codes and Cryptography Aims and scope Submit manuscript

Abstract

Group authentication schemes as introduced by Boyd and by Desmedt and Frankel are cryptographic schemes in which only certain designated groups can provide messages with authentication information. In this paper we study unconditionally secure group authentication schemes based on linear perfect secret sharing and authentication schemes, for which we give expressions for the probabilities of successful attacks. Furthermore, we give a construction that uses maximum rank distance codes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. G.R. Blakley, Safeguarding cryptographic keys, Proceedings of the National Computer Conference. AFIPS Conf. Proc.(1979) pp. 313–317.

  2. G.R. Blakely and G.A. Kabatianskii, A linear algebra approach to secret sharing schemes, Preproceedings of the Workshop on Information Protection, December (1993) Moscow.

  3. C. Boyd, Digital multisignatures, In Cryptography and coding, (H. Beker and F. Piper, editors), Clarendon Press (1989) pp. 241–246.

  4. E.F. Brickell and D.R. Stinson, Some Improved bounds on the information rate of perfect secret sharing schemes, J. Cryptology, Vol. 5, (1992) pp. 153–166.

    Article  Google Scholar 

  5. R.M. Capocelli, A. De Santis, L. Gargano, and U. Vaccaro, On the size of shares for secret sharing schemes, J. Cryptology, Vol. 6, (1993) pp. 157–167.

    Article  Google Scholar 

  6. Y. Desmedt, Threshold cryptography, Proceedings of the 3-rd Symposium on State and Progress of Research in Cryptography, February (1993) pp. 110–122.

  7. Y. Desmedt, Threshold cryptography, European Trans. on Telecommunications, Vol. 5 (1994) pp. 449–457

    Google Scholar 

  8. Y. Desmedt and Y. Frankel, Shared generation of authenticators and signatures, Proceedings of Crypto' 91, Springer-Verlag (1992) pp. 457–469.

  9. E.M. Gabidulin, Theory of codes with maximum rank distance, Problems of Information Transmission, Vol. 21, No.1 (1985) pp. 1–12, (Russian original version January-March 1985).

    Google Scholar 

  10. W.-A. Jackson and K. Martin, Geometric secret sharing schemes and their duals, Designs, Codes, and Cryptography, Vol. 5, No1. (1994) pp. 83–95.

    Google Scholar 

  11. T. Johansson, Contributions to unconditionally secure authentication, Ph.D. thesis, Lund (1994).

  12. T. Johansson, Authentication codes for nontrusting parties obtained from rank metric codes, Designs Codes and Cryptography, Vol. 6, No.3 (1995) pp. 205–218.

    Google Scholar 

  13. T. Johansson, G. Kabatanskii, and B. Smeets, On the relation between A-codes and codes correcting independent errors, Proceedings of Eurocrypt' 93, Bergen, Norway, LNCS 765, Springer-Verlag, Berlin (1993) pp. 1–11.

    Google Scholar 

  14. K. Martin and R. Safavi-Naini, Unconditionally secure authentication with shared generation of authenitcators, manuscript.

  15. R.L. Rivest, A. Shamir, and L. Adleman, A method for obtaining digital signatures and public key cryptosystems, Commun. ACM, Vol. 21 (1978) pp. 294–299.

    Article  Google Scholar 

  16. A. Shamir, How to share a secret, Commun. ACMVol. 22 (1979) pp. 612–613.

    Article  Google Scholar 

  17. G.J. Simmons, A survey of information authentication, In Contemporary Cryptology, (G.J. Simmons, Ed.), IEEE Press (1992) pp. 379–419.

  18. M. van Dijk, A linear construction of perfect secret sharing schemes, Proceedings Eurocrypt' 94, Perugia, Italy, LNCS 950, Springer-Verlag, Berlin (1995) pp. 23–34.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

van Dijk, M., Gehrmann, C. & Smeets, B. Unconditionally Secure Group Authentication. Designs, Codes and Cryptography 14, 281–296 (1998). https://doi.org/10.1023/A:1008261021505

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1023/A:1008261021505

Navigation