Using one-way functions for authentication
ACM SIGCOMM Computer Communication Review
ACM Transactions on Computer Systems (TOCS)
Tolerating failures of continuous-valued sensors
ACM Transactions on Computer Systems (TOCS)
Authentication in distributed systems: theory and practice
ACM Transactions on Computer Systems (TOCS)
A security architecture for fault-tolerant systems
ACM Transactions on Computer Systems (TOCS) - Special issue on computer architecture
Non-repudiation with mandatory proof of receipt
ACM SIGCOMM Computer Communication Review
Security in computing
Cryptography and network security (2nd ed.): principles and practice
Cryptography and network security (2nd ed.): principles and practice
Public-key cryptography and password protocols
ACM Transactions on Information and System Security (TISSEC)
Encryption and Secure Computer Networks
ACM Computing Surveys (CSUR)
Signature schemes based on the strong RSA assumption
ACM Transactions on Information and System Security (TISSEC)
Digital signatures with RSA and other public-key cryptosystems
Communications of the ACM
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Limitations of the Kerberos authentication system
ACM SIGCOMM Computer Communication Review
An authorization model for a public key management service
ACM Transactions on Information and System Security (TISSEC)
Contemporary Cryptology: The Science of Information Integrity
Contemporary Cryptology: The Science of Information Integrity
Shared Generation of Authenticators and Signatures (Extended Abstract)
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Hi-index | 0.00 |
In most studies, data security and fault tolerance are implemented separately. Solutions for each often require considerable software and/or hardware overhead. This paper proposes a systematic approach to integrate authentication and encryption with error detection/correction. Two hash functions in the row direction and in the column direction of a message matrix are introduced to provide intermediate values for the digital signature and serve as checksums for error detection/correction. By sharing the same computation, the total computation overhead is significantly reduced. The proposed approach can detect and correct up to three errors and apply to most cryptosystems.