Combinatorial Bounds and Design of Broadcast Authentication (Special Section on Discrete Mathematics and Its Applications)
スポンサーリンク
概要
- 論文の詳細を見る
This paper presents a combinatorial characterization of broadcast authentication in which a transmitter broad-casts v messages e_1(s),…,e_v(s) to authenticate a source state s to all n receivers so that any k receivers cannot cheat any other receivers, where e_i is a key. Suppose that each receiver has l keys. First, we prove that k<1 if v<n. Then we show an upper bound of n such that n≦v(v-1)/l(l-1) for k=l-1 and [numerical formula] for k<l-1. Further, a scheme for k=l-1 which meets the upper bound is presented by using a BIBD and a scheme for k<l-1 such that [numerical formula] is presented by using a Steiner system. Some other efficient schemes are also presented.
- 1996-04-25
著者
-
FUJII Hiroshi
Department of Hematology, Kyoto First Red Cross Hospital
-
Kurosawa Kaoru
Department Of Electrical And Electronic Engineering Faculty Of Engineering Tokyo Institute Of Techno
-
Kurosawa Kaoru
Department Of Behavioral Sciences Faculty Of Letters Chiba University
-
KACHEN Wattanawong
Department of Electrical and Electronic Engineering, Faculty of Engineering, Tokyo Institute of Tech
-
Fujii Hiroshi
Department Of Biochemistry Niigata University School Of Medicine
-
Fujii Hiroshi
Department Of Electrical And Electronic Engineering Faculty Of Engineering Tokyo Institute Of Techno
関連論文
- Pregnancy-Associated Thrombotic Thrombocytopenic Purpura with Anti-Centromere Antibody-Positive Raynauds Syndrome
- On the Security of a MAC by Mitchell(Symmetric Key Cryptography)(Cryptography and Information Security)
- Reduced-Intensity Conditioning Allogeneic Stem Cell Transplantation for Multiple Myeloma : Results from the Japan Myeloma Study Group
- Mononeuritis multiplex, protein-losing gastroenteropathy, and choroidopathy seen together in a case of systemic lupus erythematosus
- Human Parvovirus B19 Infection during the Inactive Stage of Systemic Lupus Erythematosus
- Thrombotic Microangiopathy Presenting with a Considerable Accumulation of Ascites: A Case Report
- Characterization of the 5' Flanking Region of the Citrus d-Limonene Synthase Gene, Which Shows a Quantitatively Preferential Expression in Peel
- Marker enrichment and construction of haplotype-specific BAC contigs for the polyembryony genomic region in Citrus
- Isolation and Characterization of a Citrus FT/TFL1 Homologue (CuMFT1), Which Shows Quantitatively Preferential Expression in Citrus Seeds
- Does supplementation of CT and MRI with gallium-67 SPECT improve the differentiation between benign and malignant tumors of the head and neck?
- Suppression of experimental lupus nephritis by aberrant expression of the soluble E-selectin gene
- TMAC: Two-Key CBC MAC (Symmetric Cipher) (Cryptography and Information Security)
- TMAC : Two-Key CBC MAC
- Combinatorial Bounds and Design of Broadcast Authentication (Special Section on Discrete Mathematics and Its Applications)
- Immunohistochemical Distribution of Intestinal 15 kDa Protein in Human Tissues
- A Network Game Based on Fair Random Numbers(Cyberworlds)
- A Scheme for Partial Disclosure of Transaction Log(Application)(Cryptography and Information Security)
- On the Correctness of Security Proofs for the 3GPP Confidentiality and Integrity Algorithms(Discrete Mathematics and Its Applications)
- How to Design Efficient Multiple-Use 1-out-n Oblivious Transfer (Protocol) (Cryptography and Information Security)
- Rapid GC-MS analysis of methamphetamine and its metabolites in urine-application of a short narrow-bore capillary column to GC-MS
- δ*_-π_L Odd Electron Delocalization onto Aromatic Bridging Ligands in a Paramagnetic Dirhodium Complex and Intermolecular π-Stack Interaction in Crystal
- Hoe to Improve Interpolation Attack(Symmetric Key Cryptography)(Cryptography and Information Security)
- On the Pseudorandomness of KASUMI Type Permutations(Discrete Mathematics and Its Applications)
- Inclusion Relations of Boolean Functions Satisfying PC(l) of Order k(Special Section on Cryptography and Information Security)
- Light Stimulation Triggered Expression of Genes Coding for Vacuolar Proton-Pump Enzymes V-ATPase and V-PPase in Buckwheat
- Some new results on nonperfect secret sharing schemes
- High transepidermal water loss induces fatty acid synthesis and cutaneous fatty acid-binding protein expression in rat skin
- Immunohistochemical distribution of cutaneous fatty acid-binding protein in human skin
- Disulfide Bonds in Rat Cutaneous Fatty Acid-Binding Protein
- Light Stimulation Triggered Expression of Genes Coding for Vacuolar Proton-Pump Enzymes V-ATPase and V-PPase in Buckwheat
- Identification of a Rat 30-kDa Protein Recognized by the Antibodies to a Recombinant Rat Cutaneous Fatty Acid-Binding Protein as a 14-3-3 Protein
- Sjogren's Syndrome Complicated with Autoimmune Hepatitis and Antiphospholipid Antibody Syndrome
- A.C. Characteristics of the Electroviscous Effect
- Transient Pressure-Drop Fluctuatins in Electroviscous Effect
- Electroviscous Effect in Liquid Crystals
- The Electroviscous Effect in the MBBA Liquid Crystal
- Cushings Syndrome due to Huge Adrenocortical Multinodular Hyperplasia
- Analysis of acetylene in blood and urine using cryogenic gas chromatography-mass spectrometry
- Diagnosis of ischemic small bowel disease by measurement of serum intestinal fatty acid-binding protein in patients with acute abdomen : a multicenter, observer-blinded validation study
- Almost Secure (1-Round, n-Channel) Message Transmission Scheme
- New bound for affine resolvable designs and its application to authentication codes
- On Parallel Hash Functions Based on Block-Ciphers (Symmetric Cipher) (Cryptography and Information Security)
- Square Hash with a Small Key Size (Symmetric Cipher) (Cryptography and Information Security)
- k-Resilient Identity-Based Encryption in the Standard Model(Public Key Cryptography, Cryptography and Information Security)
- On the Universal Hash Functions in Luby-Rackott Cipher (Symmetric Cipher) (Cryptography and Information Security)
- On the Universal Hash Functions in Luby-Rackoff Cipher
- Birthday Paradox for Multi-Collisions
- Practical and Proven Zero-Knowledge Constant Round Variants of GQ and Schnorr (Special Section on Cryptography and Information Security)
- Process interactionism, process analysis, and self process : An extension of Kurt Lewin's approach to personality psychology
- How to Design Efficient Multiple-Use 1-out-n Oblivious Transfer
- Peripheral T Cell Lymphoma with a High Titer of Proteinase-3-Antineutrophil Cytoplasmic Antibodies that Resembled Wegeners Granulomatosis
- Square Hash with a Small Key Size
- Characterization of High Valent Iron Porphyrin in Catalytic Reaction by Iron(III) Tetrapentaflurophenylporphyrin
- Relation between Verifiable Random Functions and Convertible Undeniable Signatures, and New Constructions
- Association of Hyperglycemia on Admission and During Hospitalization with Mortality in Diabetic Patients Admitted for Pneumonia
- Kinetic study on the alkaline hydrolysis of S,S-diaryl-N-halosulfilimines.
- Disulfide Bonds in Rat Cutaneous Fatty Acid-Binding Protein.