Ogawa et al., 2020 - Google Patents
Aggregate message authentication codes with detecting functionality from biorthogonal codesOgawa et al., 2020
- Document ID
- 1628717945953808091
- Author
- Ogawa Y
- Sato S
- Shikata J
- Imai H
- Publication year
- Publication venue
- 2020 IEEE International Symposium on Information Theory (ISIT)
External Links
Snippet
Message authentication code (MAC) is one of the most fundamental cryptographic primitives, and aggregate message authentication code (AMAC) is an authentication technique that can compress multiple MAC tags into a short tag for messages from multiple …
- 238000010276 construction 0 abstract description 31
Classifications
-
- H—ELECTRICITY
- H03—BASIC ELECTRONIC CIRCUITRY
- H03M—CODING; DECODING; CODE CONVERSION IN GENERAL
- H03M13/00—Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes
- H03M13/03—Error detection or forward error correction by redundancy in data representation, i.e. code words containing more digits than the source words
- H03M13/05—Error detection or forward error correction by redundancy in data representation, i.e. code words containing more digits than the source words using block codes, i.e. a predetermined number of check bits joined to a predetermined number of information bits
- H03M13/11—Error detection or forward error correction by redundancy in data representation, i.e. code words containing more digits than the source words using block codes, i.e. a predetermined number of check bits joined to a predetermined number of information bits using multiple parity bits
- H03M13/1102—Codes on graphs and decoding on graphs, e.g. low-density parity check [LDPC] codes
- H03M13/1105—Decoding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- H—ELECTRICITY
- H03—BASIC ELECTRONIC CIRCUITRY
- H03M—CODING; DECODING; CODE CONVERSION IN GENERAL
- H03M13/00—Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes
- H03M13/03—Error detection or forward error correction by redundancy in data representation, i.e. code words containing more digits than the source words
- H03M13/05—Error detection or forward error correction by redundancy in data representation, i.e. code words containing more digits than the source words using block codes, i.e. a predetermined number of check bits joined to a predetermined number of information bits
- H03M13/13—Linear codes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/004—Arrangements for detecting or preventing errors in the information received by using forward error control
- H04L1/0056—Systems characterized by the type of code used
- H04L1/0057—Block codes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/54—Store-and-forward switching systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Ogawa et al. | Aggregate message authentication codes with detecting functionality from biorthogonal codes | |
| Augot et al. | A family of fast syndrome based cryptographic hash functions | |
| US7933905B2 (en) | Universal-hash-function-family calculation unit and shared-key generation system | |
| EP2227862B1 (en) | Error correction coding using a graph having a toroid structure suitable for use in a Quantum Key Distribution system | |
| Zoni et al. | Efficient and scalable FPGA-oriented design of QC-LDPC bit-flipping decoders for post-quantum cryptography | |
| US9866349B2 (en) | Network coding over GF(2) | |
| US7995764B2 (en) | Sharing a secret using hyperplanes over GF(2m) | |
| Mazumdar et al. | Update efficient codes for error correction | |
| Hooshmand et al. | Secret key cryptosystem based on polar codes over binary erasure channel | |
| Chen et al. | On the duality between Slepian–Wolf coding and channel coding under mismatched decoding | |
| JPWO2006106841A1 (en) | Error correction coding device | |
| CN112634092A (en) | Contract authentication method and device based on block chain and electronic equipment | |
| Rudow et al. | A locality-based approach for coded computation | |
| Lu et al. | Quantum X-Secure T-Private Information Retrieval From MDS Coded Storage With Unresponsive and Byzantine Servers | |
| Telatar | Zero-error list capacities of discrete memoryless channels | |
| Van Dijk et al. | Unconditionally secure group authentication | |
| Cheng et al. | A novel homomorphic MAC scheme for authentication in network coding | |
| Guerrini et al. | Computing the distance distribution of systematic nonlinear codes | |
| Chauhan et al. | A generalized approach for the fuzzy commitment scheme | |
| Nóbrega et al. | On multiplicative matrix channels over finite chain rings | |
| Kamche et al. | Low-rank parity-check codes over finite commutative rings and application to cryptography | |
| Choi et al. | Improved, black-box, non-malleable encryption from semantic security | |
| Thakor et al. | On complexity reduction of the LP bound computation and related problems | |
| Matthews et al. | Cryptography | |
| Yasunaga | Error Correction by Structural Simplicity: Correcting Samplable Additive Errors |