15.08.2012 Views

CONTENTS - Emerald

CONTENTS - Emerald

CONTENTS - Emerald

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

041817 `How to Simultaneously Exchange Secrets by General Assumptions'<br />

TOkamoto, K Ohta, Fairfax 94 pp 184{192<br />

Existing secret exchange schemes assume either a speci c number theoretic primitive<br />

or a uniformly secure bit commitment function. The authors show that these<br />

assumptions can be weakened to the existence of one-way functions and one-way permutations.<br />

041818 `Robust Sharing of Secrets when the Dealer is Honest or Cheating'<br />

T Rabin, Journal of the ACM v 41 no 6 (Nov 94) pp 1089{1109<br />

When broadcasting is permitted, the Ben-Or bound on veri able secret sharing<br />

(that up to (n , 1)=3 players can be dishonest) is cut to (n , 1)=2. A new tool called<br />

information checking is introduced, as is a new, weaker, form of secret sharing in which<br />

a dishonest dealer can prevent the reconstruction of the secret.<br />

041819 `Combinatorial Structure of A-codes with r-fold Security'<br />

R Safavi-Naini, L Tombak, Asiacrypt 94 pp 172{184<br />

The authors study A-codes that provide r-fold protection for spoo ng of order r. It<br />

is shown that codes with secrecy correspond to t-designs, while codes without secrecy<br />

correspond to orthogonal arrays. This generalises previous results since restrictions on<br />

the minimality of the number of encoding rules and on the uniformity of the source are<br />

removed (the latter only in the case with secrecy). The authors derive explicit bounds<br />

on the number of encoding rules for r 2 based on Delsarte's linear programming<br />

bound, and construct A-codes from some error-correcting codes.<br />

041820 `Perfect authenticity and optimal A-codes'<br />

R Safavi-Naini, L Tombak, J Pieprzyk, ISITA 94 pp 235{238<br />

This paper introduces the notion of perfect authenticity in the context of unconditionally<br />

secure authentication systems, and shows that such systems require manykeys;<br />

the result is very similar to the key requirement in systems with perfect secrecy. The<br />

paper also includes a characterisation theorem for optimal A-codes which are de ned<br />

as A-codes with best possible protection and satisfying information theoretic bounds.<br />

041821 `Polynomial Time Algorithms for Discrete Logarithms and Factoring<br />

on a Quantum Computer'<br />

PW Shor, ANTS 94 p 289<br />

The author announces Las Vegas algorithms for discrete logarithm and factoring<br />

which run in random polynomial time on a quantum computer.<br />

041822 `Authentication Codes that are r-fold Secure Against Spoo ng'<br />

LTombak, R Safavi-Naini, Fairfax 94 pp 166{169<br />

The authors give an improved lower bound on the number of encoding rules for<br />

authentication codes that are r-fold secure against spoo ng, and characterise the case<br />

with a minimum number of encoding rules. This extends Stinson's characterization by<br />

removing the condition of uniform source distribution. It is shown that if the rth order<br />

statistic of the source is uniform, r-fold security against spoo ng follows from perfect<br />

protection of order r.<br />

041823 `On the Construction of Authentication and Secrecy Codes'<br />

TV Trung, Designs, Codes and Cryptography v 5 no 3 (May 95) pp 269{280<br />

The author presents recursive constructions for A-codes based on t-designs and on<br />

Stinson's authentication perpendicular arrays, and gives a table of known codes.<br />

041824 `Coding theorem for the protection of parameter estimation in<br />

Shannon cipher system'<br />

HYamamoto, JW-ISC 95 pp 61{65<br />

This paper examines the coding problem for the Shannon cipher system with a<br />

compound source.<br />

47

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!