Skip to main content
Log in

Bounds and Characterizations of Authentication/Secrecy Schemes

  • Published:
Designs, Codes and Cryptography Aims and scope Submit manuscript

Abstract

We consider authentication/secrecy schemes from the information theoretic approach. We extend results on unconditionally secure authentication schemes and then consider unconditionally secure authentication schemes that offer perfect L-fold secrecy. We consider both ordered and unordered secrecy. We establish entropy bounds on the encoding rules for authentication schemes with these types of secrecy. We provide some combinatorial characterizations and constructions for authentication schemes having perfect L-fold secrecy that meet these bounds.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. M. De Soete, Some constructions for authentication-secrecy codes, Advances in Cryptology-EUROCRYPT' 88, Lecture Notes in Comput. Sci., Vol. 330 (1988) pp. 57-75.

    Google Scholar 

  2. E. F. Brickell, A few results in message authentication, Congressus Numerantium, Vol. 43 (1984) pp. 141-154.

    Google Scholar 

  3. V. Fåk, Repeated use of codes which detect deception, IEEE Trans. on Inf. Theory, Vol. 25 (1979) pp. 233-234.

    Google Scholar 

  4. E. Gilbert, F. J. MacWilliams and N. J. A. Sloane, Codes which detect deception, Bell Systems Tech. J., Vol. 53 (1974) pp. 405-424.

    Google Scholar 

  5. P. Godlewski and C. Mitchell, Key-minimal cryptosystems for unconditional secrecy, J. Cryptology, Vol. 3 (1990) pp. 1-25.

    Google Scholar 

  6. J. L. Massey, Cryptography-a selective survey, Digital Communications, North-Holland (1986) pp. 3-21.

  7. C. Mitchell, M. Walker and P. Wild, The combinatorics of perfect authentication schemes, SIAM J. Disc. Math., Vol. 7 (1994) pp. 102-107.

    Google Scholar 

  8. D. Pei, Information-theoretic bounds for authentication codes and block designs, J. Cryptology, Vol. 8 (1995) pp. 177-188.

    Google Scholar 

  9. D. Pei and Y. Wang, Authentication codes achieving information-theoretic bounds, preprint.

  10. U. Rosenbaum, A lower bound on authentication after having observed a sequence of messages, J. Cryptology, Vol. 6 (1993) pp. 135-156.

    Google Scholar 

  11. R. Safavi-Naini and L. Tombak, Authentication codes in plaintext and chosen-content attacks, Advances in Cryptology-EUROCRYPT' 94, Lecture Notes in Comput. Sci., Vol. 950 (1995) pp. 254-265.

    Google Scholar 

  12. P. Schobi, Perfect authentication systems for data with arbitrary statistics. Presented at EUROCRYPT' 86.

  13. C. E. Shannon, Communication theory of secrecy systems, Bell System Tech. Journal, Vol. 28 (1949) pp. 656-715.

    Google Scholar 

  14. G. J. Simmons, A game theory model of digital message authentication, Congressus Numerantium, Vol. 34 (1982) pp. 413-424.

    Google Scholar 

  15. G. J. Simmons, Authentication theory/coding theory, Advances in Cryptology-CRYPTO' 84, Lecture Notes in Comput. Sci., Vol. 196 (1984) pp. 411-431.

    Google Scholar 

  16. B. Smeets, A short proof of a lower bound on the probability of deception in multiple authentication, J. Cryptology, submitted.

  17. D. R. Stinson, The combinatorics of authentication and secrecy codes, J. Cryptology,Vol. 2 (1990) pp. 23-49.

    Google Scholar 

  18. D. R. Stinson and L. Teirlinck, A construction for authentication/secrecy codes from 3-homogeneous permutation groups, European J. Combin., Vol. 11 (1990) pp. 73-79.

    Google Scholar 

  19. M. Walker, Information-theoretic bounds for authentication schemes, J. Cryptology, Vol. 2 (1990) pp. 131-143.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Casse, L.R.A., Martin, K.M. & Wild, P.R. Bounds and Characterizations of Authentication/Secrecy Schemes. Designs, Codes and Cryptography 13, 107–129 (1998). https://doi.org/10.1023/A:1008270111149

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1023/A:1008270111149

Navigation