Skip to main content
placeholder image

Some remarks on authentication systems

Chapter


Abstract


  • Brickell, Simmons and others have discussed doubly perfect authentication systems in which an opponent’s chance of deceiving the receiver is a minimum for a given number of encoding rules. Brickell has shown that in some instances to achieve this minimum the system needs to have splitting. Such a system uses a larger message space. Motivated by Brickell’s ideas we consider authentication systems with splitting and the problems of reducing the message space.

Publication Date


  • 1990

Citation


  • Anthony, M. H. G., Martin, K. M., Seberry, J., & Wild, P. (1990). Some remarks on authentication systems. In Unknown Book (Vol. 453 LNCS, pp. 122-139). doi:10.1007/BFb0030356

International Standard Book Number (isbn) 13


  • 9783540530008

Scopus Eid


  • 2-s2.0-84901926461

Web Of Science Accession Number


Book Title


  • Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Start Page


  • 122

End Page


  • 139

Abstract


  • Brickell, Simmons and others have discussed doubly perfect authentication systems in which an opponent’s chance of deceiving the receiver is a minimum for a given number of encoding rules. Brickell has shown that in some instances to achieve this minimum the system needs to have splitting. Such a system uses a larger message space. Motivated by Brickell’s ideas we consider authentication systems with splitting and the problems of reducing the message space.

Publication Date


  • 1990

Citation


  • Anthony, M. H. G., Martin, K. M., Seberry, J., & Wild, P. (1990). Some remarks on authentication systems. In Unknown Book (Vol. 453 LNCS, pp. 122-139). doi:10.1007/BFb0030356

International Standard Book Number (isbn) 13


  • 9783540530008

Scopus Eid


  • 2-s2.0-84901926461

Web Of Science Accession Number


Book Title


  • Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Start Page


  • 122

End Page


  • 139