Skip to main content
Log in

Authentication Schemes, Perfect Local Randomizers, Perfect Secrecy and Secret Sharing Schemes

  • Published:
Designs, Codes and Cryptography Aims and scope Submit manuscript

Abstract

In this paper we use results on authentication schemes to derive alternative proofs for results on perfect local randomnes in pseudo-random sequences, on block cipher systems which afford perfect secrecy against known plaintext attacks and on secret sharing schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. G. R. Blakley, Safeguading cryprographic keys, Proc AFIPS 1979 Natl. Conputer Conf, New York, 48 (1979) pp. 113–317.

    Google Scholar 

  2. E. F. Brickell and D. R. Stinson, Some improved bounds on the information rate of perfect secret sharing schemes, J. of Cryptology, Vol. 5 (1992) pp. 153–166.

    Google Scholar 

  3. E. N. Gilbert, F. J. MacWilliams, and N. J. A. Sloane, Codes which detect deception, Bell System Technical Journal, Vol. 53 (1974) pp. 405–424.

    Google Scholar 

  4. P. Godlewski and C. Mitchell, Key-minimal cryptosystems for unconditional secrecy, J. of Cryptology, Vol. 3 (1990) pp. 1–25.

    Google Scholar 

  5. U. M. Maurer and J. L. Massey, Local randomness in pseudo-random sequences, J. of Cryptology, Vol. 4 (1991) pp135–149.

    Google Scholar 

  6. J. L. Massey, Cryptography-a selective survey, in Digital Communications, C. Biglieri and C. Prati (Eds.), Elsevier (North-Holland) (1986) pp 3–21.

  7. C. Mitchell, M. Walker and P. Wild, The combinatories of perfect authentication schemes, SIAM J. Disc. Math., Vol. 7 (1994) pp. 102–107.

    Google Scholar 

  8. U. Rosenbaum, A lower bound on authentication after having observed a sequence of messages, J. of Cryptology, Vol. 6 (1993) pp. 135–156.

    Google Scholar 

  9. A. Shamir, How to share a secret, Comm. of the ACM, Vol. 22 (1979) pp. 612–613.

    Google Scholar 

  10. C. E. Shannon. Communication theory of secrecy systems, Bell System Technical Journal, Vol. 28 (1949) pp. 656–715.

    Google Scholar 

  11. G. J. Simmons, A game theoretical model of digital message authentication, Congressus Numerantium, Vol. 34 (1982) pp. 413–424.

    Google Scholar 

  12. G. J. Simmons, Authentication theory/coding theory, Advances In Cryptology: Crypto 84, Lecture Notes in Computer Science, Springer-Verlag, Berlin, 196 (1985) pp411–431.

    Google Scholar 

  13. G. J. Simmons, Robust shared secret schemes or ‘how to be sure you have the right answer even though you don't know the question’, Congressus Numerantium, Vol. 68 (1989) pp. 215–248.

    Google Scholar 

  14. G. J. Simmons, How to (really) share a secret, Advances in Cryptology: Crypto 88, Lecture Notes in Computer Science, Springer Verlag, Berlin, 403 (1990) pp. 390–448.

    Google Scholar 

  15. G. J. Simmons, W.-A. Jackson, and K. M. Martin, The geometry of shared secret schemes, Bull of the ICA, Vol. 1 (1991) pp. 71–78.

    Google Scholar 

  16. M. Walker, Information-theoretic bounds for authentication schemes, J. of Cryptology (1990) pp. 131–143.

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Mitchell, C.J., Piper, F.C., Walker, M. et al. Authentication Schemes, Perfect Local Randomizers, Perfect Secrecy and Secret Sharing Schemes. Designs, Codes and Cryptography 7, 101–110 (1996). https://doi.org/10.1023/A:1018052831124

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1023/A:1018052831124

Keywords

Navigation