Open Access System for Information Sharing

Login Library

 

Article
Cited 7 time in webofscience Cited 7 time in scopus
Metadata Downloads

Authentication codes and bipartite graphs SCIE SCOPUS

Title
Authentication codes and bipartite graphs
Authors
Feng, RQHu, LKwak, JH
Date Issued
2008-08
Publisher
ACADEMIC PRESS LTD ELSEVIER SCIENCE L
Abstract
In this paper, a characterization of authentication codes in terms of bipartite graphs is given. By using such a characterization, two necessary and sufficient conditions for a minimal authentication code with perfect secrecy are derived. The probabilities of a successful impersonation and of a Successful substitution attack are discussed. As a result, some (optimal) minimal authentication codes with perfect secrecy are constructed from association schemes, from finite groups or from known authentication codes no matter whether the known ones are with or without secrecy. (C) 2007 Elsevier Ltd. All rights reserved.
Keywords
SCHEMES; DESIGNS
URI
https://oasis.postech.ac.kr/handle/2014.oak/22691
DOI
10.1016/j.ejc.2007.06.013
ISSN
0195-6698
Article Type
Article
Citation
EUROPEAN JOURNAL OF COMBINATORICS, vol. 29, no. 6, page. 1473 - 1482, 2008-08
Files in This Item:
There are no files associated with this item.

qr_code

  • mendeley

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Views & Downloads

Browse