Abstract
In this paper we show an explicit relation between authentication codes and codes correcting independent errors. This relation gives rise to several upper bounds on A-codes. We also show how to construct A-codes starting from error correcting codes. The latter is used to show that if P s exceeds P I by an arbitrarily small positive amount, then the number of source states grows exponentially with the number of keys but if P s = P I it will grow only linearly.
July 23, 1993
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
E.N. Gilbert, F.J. MacWilliams and N.J.A. Sloane, “Codes which detect deception”, Bell Syst. Tech. J., Vol. 53, no. 3, 1974, pp. 405–424.
G.J. Simmons, “Authentication theory/coding theory”, in Advances in Cryptology, Proceedings of CRYPTO 84, G.R. Blakley and D. Chaum, Eds. Lecture Notes in Computer Science, No. 196. New York, NY: Springer, 1985, pp. 411–431.
G.J. Simmons, “A survey of Information Authentication”, in Contemporary Cryptology, The science of information integrety, ed. G.J. Simmons, IEEE Press, New York, 1992.
D.R. Stinson, “The combinatorics of authentication and secrecy codes”, Journal of Cryptology, Vol. 2, no. 1, 1990, pp. 23–49.
D.R. Stinson, “Universal hashing and authentication codes” Proceedings of Crypto 91, Santa Barbara, USA, 1991, pp. 74–85.
F.J. McWilliams, N. Sloane, The Theory of Error-Correcting Codes, North-Holland, New-York, 1977.
S. Roman, Coding and Information Theory, Springer-Verlag, New York, 1992.
M.A. Tsfasman, S.G. VlăduţAlgebraic-Geometric Codes, Kluwer Academic Publ., Dortrecht, 1991.
M.N. Wegman, J.L. Carter, “New hash functions and their use in authentication and set equality”, J. Computer and System Sciences, Vol. 22, 1981, pp. 265–279.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1994 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Johansson, T., Kabatianskii, G., Smeets, B. (1994). On the Relation Between A-Codes and Codes Correcting Independent Errors. In: Helleseth, T. (eds) Advances in Cryptology — EUROCRYPT ’93. EUROCRYPT 1993. Lecture Notes in Computer Science, vol 765. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48285-7_1
Download citation
DOI: https://doi.org/10.1007/3-540-48285-7_1
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-57600-6
Online ISBN: 978-3-540-48285-7
eBook Packages: Springer Book Archive