Authentication Schemes, Perfect Local Randomizers, Perfect Secrecy and Secret Sharing Schemes

  • Authors:
  • C. J. Mitchell;F. C. Piper;M. Walker;P. Wild

  • Affiliations:
  • Information Security Group, Royal Holloway, University of London;Information Security Group, Royal Holloway, University of London;Information Security Group, Royal Holloway, University of London;Information Security Group, Royal Holloway, University of London

  • Venue:
  • Designs, Codes and Cryptography - Special issue dedicated to Gustavus J. Simmons
  • Year:
  • 1996

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper we use results on authentication schemes to derive alternative proofs for results on perfect local randomnes in pseudo-random sequences, on block cipher systems which afford perfect secrecy against known plaintext attacks and on secret sharing schemes.