Authentication theory/coding theory
Proceedings of CRYPTO 84 on Advances in cryptology
Some constructions and bounds for authentication codes
Journal of Cryptology
Some constructions for authentication-secrecy codes
Lecture Notes in Computer Science on Advances in Cryptology-EUROCRYPT'88
The combinatorics of authentication and secrecy codes
Journal of Cryptology
Public-key cryptosystems provably secure against chosen ciphertext attacks
STOC '90 Proceedings of the twenty-second annual ACM symposium on Theory of computing
Bounds and constructions for authentication-secrecy codes with splitting
CRYPTO '88 Proceedings on Advances in cryptology
Multi-receiver/multi-sender network security: efficient authenticated multicast/feedback
IEEE INFOCOM '92 Proceedings of the eleventh annual joint conference of the IEEE computer and communications societies on One world through communications (Vol. 3)
On the construction of authentication and secrecy codes
Designs, Codes and Cryptography
Combinatorial Characterizations of Authentication Codes II
Designs, Codes and Cryptography
Bounds and Characterizations of Authentication/SecrecySchemes
Designs, Codes and Cryptography
Multireceiver authentication code4: models, bounds, constructions, and extensions
Information and Computation
Characterisation of (k, n) Multi-receiver Authentication
ACISP '97 Proceedings of the Second Australasian Conference on Information Security and Privacy
On the Security of Joint Signature and Encryption
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
Security Notions for Unconditionally Secure Signature Schemes
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
Unconditionally Secure Digital Signature Schemes Admitting Transferability
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Unconditionally Secure Anonymous Encryption and Group Authentication
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Hi-index | 0.00 |
Unconditional security provides security independent of assumptions regarding adversaries resources. Considerable research has been carried out into unconditionally secure authentication codes without secrecy, wherein the confidentiality of the plaintext is unimportant. Unconditionally secure encryption has been less thoroughly studied. The traditional framework for considering integrity and confidentiality in an unconditionally secure environment is that of authentication codes with secrecy. We extend this framework, in the symmetric case, to encompass aspects of recent work on unconditionally secure formulations of authentication codes and encryption systems. This will allow for a systematic analysis of unconditionally secure authenticated encryption schemes.