EconPapers    
Economics at your fingertips  
 

Three constructions of perfect authentication codes from projective geometry over finite fields

Shangdi Chen and Xiaolian Zhang

Applied Mathematics and Computation, 2015, vol. 253, issue C, 308-317

Abstract: We construct perfect authentication codes from the projective geometry over finite fields. There are three major constructions. The first construction is a perfect authentication code with splitting, the second construction is a perfect authentication codes with arbitration, and the third construction is a perfect authentication code without arbitration which is an extension of the second construction. Their parameters and probabilities of successful attacks are computed.

Keywords: Authentication code; Perfect; Splitting; Arbitration; Projective geometry (search for similar items in EconPapers)
Date: 2015
References: View complete reference list from CitEc
Citations:

Downloads: (external link)
http://www.sciencedirect.com/science/article/pii/S0096300314017494
Full text for ScienceDirect subscribers only

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:eee:apmaco:v:253:y:2015:i:c:p:308-317

DOI: 10.1016/j.amc.2014.12.088

Access Statistics for this article

Applied Mathematics and Computation is currently edited by Theodore Simos

More articles in Applied Mathematics and Computation from Elsevier
Bibliographic data for series maintained by Catherine Liu ().

 
Page updated 2025-03-19
Handle: RePEc:eee:apmaco:v:253:y:2015:i:c:p:308-317