Randomized authentication systems

  • Authors:
  • Josef Pieprzyk;Reihaneh Safavi-Naini

  • Affiliations:
  • Department of Computer Science, University College, University of New South Wales, Australian Defence Force Academy, Canberra, ACT, Australia and Department of Mathematic, Statistic and Computing, ...;Department of Computer Science, University College, University of New South Wales, Australian Defence Force Academy, Canberra, ACT, Australia and Department of Mathematic, Statistic and Computing, ...

  • Venue:
  • EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
  • Year:
  • 1991

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this work, the application of Luby-Rackoff randomizers for authentication purposes is examined. First randomized authentication codes are introduced. In these codes, the assignment of a cryptogram to a given message is done in two stages. In the first, the redundancy is introduced and in the second, the concatenation of several Luby-Rackoff randomizers is used. Next, perfect A-codes are defined. The quality of the authentication codes (A-codes) is measured using the concept of distinguishing circuits. Three A-codes with different redundancy stages are examined and proven that they are perfect if the suitable number of Luby-Rackoff randomizers is used in the second stage of the A-code.