Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
4627041 | Applied Mathematics and Computation | 2015 | 10 Pages |
Abstract
We construct perfect authentication codes from the projective geometry over finite fields. There are three major constructions. The first construction is a perfect authentication code with splitting, the second construction is a perfect authentication codes with arbitration, and the third construction is a perfect authentication code without arbitration which is an extension of the second construction. Their parameters and probabilities of successful attacks are computed.
Related Topics
Physical Sciences and Engineering
Mathematics
Applied Mathematics
Authors
Shangdi Chen, Xiaolian Zhang,