Characterization of (k, n) multi-receiver authentication

21Citations
Citations of this article
21Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In the model of (k, n) multi-receiver authentication codes there are n receivers. An opponent and any k-1 receivers cannot cheat any other receiver. Here we show tight lower bounds on the size of messages and the size of keys for given cheating probabilities. We also show a necessary and sufficient condition for the optimum scheme, which is given by a combinatorial characterization between the transmitter’s keys and the keys of each receiver.

Cite

CITATION STYLE

APA

Kurosawa, K., & Obana, S. (1997). Characterization of (k, n) multi-receiver authentication. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1270, pp. 204–215). Springer Verlag. https://doi.org/10.1007/BFb0027927

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free