[1] Shannon C E. Communication theory of secrecy system[J]. Bell System Technical Journal, 1949, 28:656-715. [2] Simmons G J. Authentication theory/coding theory[C]//Workshop on the Theory and Application of Cryptographic Techniques:Proceedings of CRYPTO 84, 1984:411-431. [3] Gilbert E N, MacWillams F J, Sloane N J A. Codes which detect deception[J]. Bell System Technical Journal, 1974, 53:405-424. [4] 邱双月. 利用有限域上奇异酉空间构作Cartesian认证码[J]. 河北师范大学学报(自然科学版), 2014, 5:439-444. Qiu S Y. A construction of Cartesian authentication code from singular unitary space a finite field[J]. Journal of Hebei Normal University (Natural Science Edition), 2014, 5:439-444. (in Chinese) [5] 邱双月, 刘文菡,张更生. 利用有限域上δ为1 的奇异酉空间构作Cartesian认证码[J]. 数学的实践与认识, 2015, 45(11):313-316. Qiu S Y, Liu W H, Zhang G S. A construction of Cartesian authentication code from singular unitary space over the finite filed δ=1[J]. Mathematics in Practice and Theory, 2015, 45(11):313-316. (in Chinese) [6] Chen S D, Tian W J. Construction of authentication codes with distrust arbitration from unitary geometry[J]. Journal of Combinatorial Mathematics and Combinatorial Computing, 2018, 105:131-145. [7] 李殿龙. 基于矩阵方法的Cartesian认证码构造[J]. 计算机工程, 2010, 36(12):162-166. Li D L. Construction of Cartesian authentication code based on matrices method[J]. Computer Engineering, 2010, 36(12):162-166. (in Chinese) [8] 裴定一. 消息认证码[M]. 合肥:中国科学技术大学出版社,2009. [9] Pei D Y. Authentication codes and combinatorial designs[M]. Boca Raton London New York:Taylor & Francis Group, 2006. [10] Safavi-Naini R, Tonien D, Wild P R. Authentication codes in the query model[J]. Coding and Cryptology, 2008:214-225. [11] 王永传. 由分裂认证码构造有仲裁认证码[J]. 通信保密, 1999(3):46-49. Wang Y C. Constructions of authentication codes with arbitration from splitting authentication coeds[J]. Communication Security, 1999(3):46-49. (in Chinese) [12] Simmons G J. A game theory model of digital message authentication[J]. Journal of Crytology, 1982, 43:413-424. [13] 王永传, 杨义先. 分裂认证码与纠错码[J]. 通信保密, 1999(1):64-66. Wang Y C, Yang Y X. Splitting authentication codes with and error-correcting codes[J]. Communication Security, 1999(1):64-66. (in Chinese) [14] 王永传, 杨义先. 一类分裂的Cartesian认证码的构造[J]. 通信保密, 1997(4):48-51. Wang Y C, Yang Y X. Constructions of a class of splitting Cartesian authentication codes[J]. Communication Security, 1997(4):48-51. (in Chinese) [15] Huber M. Combinatorial bounds and characterizations of splitting authentication codes[J]. Cryptography and Communications, 2010, 2:173-185. [16] Kurosawa K, Obana S. Combinatorial bounds on authentication codes with arbitration[J]. Designs, Codes and Cryptography, 2001, 22(3):265-281. [17] Pei D Y, Li Y Q, Wang Y J. et al. Characterization of optimal authentication codes with arbitration[J]. Lecture Notes in Computer Science, 1999, 1587:303-313. [18] Ogata W, Kurosawa K, Stinson D R, et al. New combinatorial designs and their applications to authentication codes and secret sharing schemes[J]. Discrete Mathematics, 2004, 279:383-405. [19] Liang M, Du B L. A new class of 3-fold perfect splitting authentication codes[J]. Designs, Codes and Cryptography, 2012, 62:109-119. [20] Chen S D, Zhang X L. Three constructions of perfect authentication codes from projective geometry over finite fields[J]. Applied Mathematics and Computation, 2015, 253:308-317. [21] Matsubara K, Sawa M, Kageyama S. Existence on splitting-balanced block designs with resolvability[J]. Graphs and Combinatorics, 2017, 33:561-572. [22] Liang M, Ji L, Zhang J. Some new classes of 2-fold optimal or perfect splitting authentication codes[J]. Cryptography and Communications, 2017, 9:407-430. [23] Li M C, Liang M, Du, B L, et al. A construction for optimal c-splitting authentication and secrecy codes[J]. Designs, Codes and Cryptography, 2018, 86:1739-1755. [24] 王利娜.基于有限域几何空间和组合设计构造认证码[D].天津:中国民航大学,2017. |