In the model of (k, n) multi-receiver authentication codes there are n receivers. An opponent and any k-1 receivers cannot cheat any other receiver. Here we show tight lower bounds on the size of messages and the size of keys for given cheating probabilities. We also show a necessary and sufficient condition for the optimum scheme, which is given by a combinatorial characterization between the transmitter’s keys and the keys of each receiver.
CITATION STYLE
Kurosawa, K., & Obana, S. (1997). Characterization of (k, n) multi-receiver authentication. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1270, pp. 204–215). Springer Verlag. https://doi.org/10.1007/BFb0027927
Mendeley helps you to discover research relevant for your work.