CONTENTS - Emerald
CONTENTS - Emerald
CONTENTS - Emerald
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
041817 `How to Simultaneously Exchange Secrets by General Assumptions'<br />
TOkamoto, K Ohta, Fairfax 94 pp 184{192<br />
Existing secret exchange schemes assume either a speci c number theoretic primitive<br />
or a uniformly secure bit commitment function. The authors show that these<br />
assumptions can be weakened to the existence of one-way functions and one-way permutations.<br />
041818 `Robust Sharing of Secrets when the Dealer is Honest or Cheating'<br />
T Rabin, Journal of the ACM v 41 no 6 (Nov 94) pp 1089{1109<br />
When broadcasting is permitted, the Ben-Or bound on veri able secret sharing<br />
(that up to (n , 1)=3 players can be dishonest) is cut to (n , 1)=2. A new tool called<br />
information checking is introduced, as is a new, weaker, form of secret sharing in which<br />
a dishonest dealer can prevent the reconstruction of the secret.<br />
041819 `Combinatorial Structure of A-codes with r-fold Security'<br />
R Safavi-Naini, L Tombak, Asiacrypt 94 pp 172{184<br />
The authors study A-codes that provide r-fold protection for spoo ng of order r. It<br />
is shown that codes with secrecy correspond to t-designs, while codes without secrecy<br />
correspond to orthogonal arrays. This generalises previous results since restrictions on<br />
the minimality of the number of encoding rules and on the uniformity of the source are<br />
removed (the latter only in the case with secrecy). The authors derive explicit bounds<br />
on the number of encoding rules for r 2 based on Delsarte's linear programming<br />
bound, and construct A-codes from some error-correcting codes.<br />
041820 `Perfect authenticity and optimal A-codes'<br />
R Safavi-Naini, L Tombak, J Pieprzyk, ISITA 94 pp 235{238<br />
This paper introduces the notion of perfect authenticity in the context of unconditionally<br />
secure authentication systems, and shows that such systems require manykeys;<br />
the result is very similar to the key requirement in systems with perfect secrecy. The<br />
paper also includes a characterisation theorem for optimal A-codes which are de ned<br />
as A-codes with best possible protection and satisfying information theoretic bounds.<br />
041821 `Polynomial Time Algorithms for Discrete Logarithms and Factoring<br />
on a Quantum Computer'<br />
PW Shor, ANTS 94 p 289<br />
The author announces Las Vegas algorithms for discrete logarithm and factoring<br />
which run in random polynomial time on a quantum computer.<br />
041822 `Authentication Codes that are r-fold Secure Against Spoo ng'<br />
LTombak, R Safavi-Naini, Fairfax 94 pp 166{169<br />
The authors give an improved lower bound on the number of encoding rules for<br />
authentication codes that are r-fold secure against spoo ng, and characterise the case<br />
with a minimum number of encoding rules. This extends Stinson's characterization by<br />
removing the condition of uniform source distribution. It is shown that if the rth order<br />
statistic of the source is uniform, r-fold security against spoo ng follows from perfect<br />
protection of order r.<br />
041823 `On the Construction of Authentication and Secrecy Codes'<br />
TV Trung, Designs, Codes and Cryptography v 5 no 3 (May 95) pp 269{280<br />
The author presents recursive constructions for A-codes based on t-designs and on<br />
Stinson's authentication perpendicular arrays, and gives a table of known codes.<br />
041824 `Coding theorem for the protection of parameter estimation in<br />
Shannon cipher system'<br />
HYamamoto, JW-ISC 95 pp 61{65<br />
This paper examines the coding problem for the Shannon cipher system with a<br />
compound source.<br />
47