首页 | 本学科首页   官方微博 | 高级检索  
     

Authentication-secrecy code based on conies over finite fields
引用本文:裴定一,王学理. Authentication-secrecy code based on conies over finite fields[J]. 中国科学E辑(英文版), 1996, 0(5)
作者姓名:裴定一  王学理
作者单位:State Key Laboratory of Information Security,Graduate School of Chinese Academy of Sciences,Beijing 100039,Institute of Mathematics and Information Security,Guangzhou Teachers College,Guangzhou 510400,China,State Key Laboratory of Information Security,Graduate School of Chinese Academy of Sciences,Beijing 100039,Institute of Mathematics and Information Security,Guangzhou Teachers College,Guangzhou 510400,China
基金项目:Project supported by the National Natural Science Foundation of China and the Natural Science Foundation of Guangdong Province.
摘    要:An authentication-secrecy code based on the rational normal curves over finite fields was constructed,whose probabilities of successful deception achieve their information-theoretic bounds.The set of encoding rules for this code is a representation system for cosets of a certain subgroup in the projective transformation group.A special case is studied,i.e.the rational normal curves are the conies over finite fields.The representation system for the cosets which determines the set of encoding rules will be given.


Authentication-secrecy code based on conies over finite fields
PEI Dingyi and WANG Xueli. Authentication-secrecy code based on conies over finite fields[J]. Science in China(Technological Sciences), 1996, 0(5)
Authors:PEI Dingyi and WANG Xueli
Abstract:An authentication-secrecy code based on the rational normal curves over finite fields was constructed,whose probabilities of successful deception achieve their information-theoretic bounds.The set of encoding rules for this code is a representation system for cosets of a certain subgroup in the projective transformation group.A special case is studied,i.e.the rational normal curves are the conies over finite fields.The representation system for the cosets which determines the set of encoding rules will be given.
Keywords:authentication code  information-theoretic bound  conic  finite field.
本文献已被 CNKI 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号