Skip to main content

Advertisement

SpringerLink
Log in
Menu
Find a journal Publish with us
Search
Cart
Book cover

International Conference on the Theory and Applications of Cryptographic Techniques

EUROCRYPT 1995: Advances in Cryptology — EUROCRYPT ’95 pp 311–318Cite as

  1. Home
  2. Advances in Cryptology — EUROCRYPT ’95
  3. Conference paper
A2—codes from universal hash classes

A2—codes from universal hash classes

  • Jürgen Bierbrauer6 
  • Conference paper
  • First Online: 01 January 2001
  • 1311 Accesses

Part of the Lecture Notes in Computer Science book series (LNCS,volume 921)

Abstract

We describe a general method to construct codes for unconditional authentication with arbitration (A 2-codes), which protect not only against outside opponents but also against certain types of frauds from the receiver and transmitter. The constructions are based on orthogonal arrays and universal hash classes. The idea is to construct A 2-codes out of pairs of A-codes. The hitherto known examples are special cases of the construction. Along the way we also construct new universal hash classes.

Download conference paper PDF

References

  1. J. Bierbrauer: Universal hashing and geometric codes, to appear in Designs, Codes and Cryptography.

    Google Scholar 

  2. J. Bierbrauer, T. Johansson, G. Kabatianskii, B. Smeets: On families of hash functions via geometric codes and concatenation, Proceedings of CRYPTO’93, Lecture Notes in Computer Science 773 (1994), 331–342.

    Google Scholar 

  3. J.L. Carter, M.N. Wegman: Universal Classes of Hash Functions, J.Computer and System Sci. 18 (1979), 143–154.

    CrossRef  MATH  MathSciNet  Google Scholar 

  4. E.N. Gilbert, F.J. MacWilliams, N.J.A. Sloane: Codes which detect deception, Bell System Technical Journal 53 (1974), 405–424.

    MathSciNet  Google Scholar 

  5. T. Johansson: Lower bounds on the probability of deception in authentication with arbitration, in Proceedings of the 1993 IEEE International Symposium on Information Theory, San Antonio, USA, page 231.

    Google Scholar 

  6. T. Johansson: On the construction of perfect authentication codes that permit arbitration, Proceedings of CRYPTO’93, Lecture Notes in Computer Science 773 (1994), 343–354.

    Google Scholar 

  7. T. Johansson, G. Kabatianskii, B. Smeets: On the relation between A-codes and codes correcting independent errors, Proceedings Eurocrypt 93, 1–11.

    Google Scholar 

  8. K. Kurosawa: New bound on authentication code with arbitration, Proceedings of CRYPTO’94, Lecture Notes in Computer Science 839 (1994), 140–149.

    Google Scholar 

  9. G.J. Simmons: Message authentication with arbitration of transmitter/receiver disputes, Proceedings Eurocrypt 87, 151–165.

    Google Scholar 

  10. G.J. Simmons: A cartesian product construction for unconditionally secure authentication codes that permit arbitration, Journal of Cryptology 2 (1990), 77–104.

    CrossRef  MATH  MathSciNet  Google Scholar 

  11. D.R. Stinson: The combinatorics of authentication and secrecy codes, Journal of Cryptology 2 (1990), 23–49.

    CrossRef  MATH  MathSciNet  Google Scholar 

  12. M.N. Wegman, J.L. Carter: New hash functions and their use in authentication and set equality, J.Computer and System Sci. 22 (1981), 265–279.

    CrossRef  MATH  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

  1. Department of Mathematical Sciences, Michigan Technological University, Houghton, MI, 49931, USA

    Jürgen Bierbrauer

Authors
  1. Jürgen Bierbrauer
    View author publications

    You can also search for this author in PubMed Google Scholar

Editor information

Editors and Affiliations

  1. CCETT, 4, rue du Clos Courtel, F-35512, Cesson-Sevigne Cedex, France

    Louis C. Guillou

  2. Department of Electrical Engineering (DICE), Place du Levant, 3, B-1348, Louvain-la-Neuve, Belgium

    Jean-Jacques Quisquater

Rights and permissions

Reprints and Permissions

Copyright information

© 1995 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bierbrauer, J. (1995). A2—codes from universal hash classes. In: Guillou, L.C., Quisquater, JJ. (eds) Advances in Cryptology — EUROCRYPT ’95. EUROCRYPT 1995. Lecture Notes in Computer Science, vol 921. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-49264-X_25

Download citation

  • .RIS
  • .ENW
  • .BIB
  • DOI: https://doi.org/10.1007/3-540-49264-X_25

  • Published: 13 July 2001

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-59409-3

  • Online ISBN: 978-3-540-49264-1

  • eBook Packages: Springer Book Archive

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Search

Navigation

  • Find a journal
  • Publish with us

Discover content

  • Journals A-Z
  • Books A-Z

Publish with us

  • Publish your research
  • Open access publishing

Products and services

  • Our products
  • Librarians
  • Societies
  • Partners and advertisers

Our imprints

  • Springer
  • Nature Portfolio
  • BMC
  • Palgrave Macmillan
  • Apress
  • Your US state privacy rights
  • Accessibility statement
  • Terms and conditions
  • Privacy policy
  • Help and support

65.108.231.39

Not affiliated

Springer Nature

© 2023 Springer Nature