Authentication theory/coding theory
Proceedings of CRYPTO 84 on Advances in cryptology
Some constructions and bounds for authentication codes
Journal of Cryptology
The combinatorics of authentication and secrecy codes
Journal of Cryptology
Multi-receiver/multi-sender network security: efficient authenticated multicast/feedback
IEEE INFOCOM '92 Proceedings of the eleventh annual joint conference of the IEEE computer and communications societies on One world through communications (Vol. 3)
Combinatorial characterizations of authentication codes
Designs, Codes and Cryptography
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
On Some Methods for Unconditionally Secure Key Distributionand Broadcast Encryption
Designs, Codes and Cryptography - Special issue: selected areas in cryptography I
Combinatorial Properties and Constructions of Traceability Schemes and Frameproof Codes
SIAM Journal on Discrete Mathematics
Characterisation of (k, n) Multi-receiver Authentication
ACISP '97 Proceedings of the Second Australasian Conference on Information Security and Privacy
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
RLH: receiver driven layered hash-chaining for multicast data origin authentication
Computer Communications
On the security of a public-key traitor tracing scheme with sublinear ciphertext size
Proceedings of the nineth ACM workshop on Digital rights management
Combinatorial Designs for Authentication and Secrecy Codes
Foundations and Trends in Communications and Information Theory
Hi-index | 0.00 |
In the model of(k,n) multi-receiver authentication codes ( A-codes),a transmitter broadcasts a message m to nreceivers in such a way that not only an outside opponent butalso any k-1 receivers cannot cheat any other receiver.In this paper, we derive lower bounds on the cheating probabilitiesand the sizes of keys of (k,n) multi-receiver A-codes.The scheme proposed by Desmedt, Frankel and Yung meets all ourbounds with equalities. This means that our bounds are tightand their scheme is optimum. We further show a combinatorialstructure of optimum (k,n) multi-receiver A-codes.A notion of TWOOAs is introduced. A TWOOA is a pair of orthogonalarrays which satisfy a certain condition. We then prove thatan optimum (k,n) multi-receiver A-codeis equivalent to a TWOOA.