Three Constructions of Authentication Codes with Perfect Secrecy.
Cunsheng DingXiaojian TianPublished in: Des. Codes Cryptogr. (2004)
Keyphrases
- key distribution
- security analysis
- mutual authentication
- error correction
- user authentication
- key management
- authentication protocol
- fragile watermarking
- image authentication
- authentication scheme
- security properties
- fault tolerant
- identity authentication
- digital watermarking
- privacy protection
- error correcting codes
- authentication mechanism
- spread spectrum
- public key
- security requirements
- signal to noise ratio
- data encryption
- integrity verification
- smart card