Preprint
Article

This version is not peer-reviewed.

Three Authentication Schemes Based on Finite Fields and Galois Rings

Submitted:

25 January 2021

Posted:

26 January 2021

Read the latest preprint version here

Abstract
We give three new systematic authentication schemes, two using Gray map, finite fields and Galois rings, and one using only Galois rings. In the first scheme, we increase the size and simplify the scheme’s source space in [9]. In the second scheme, we reduce the key space of the first scheme. Finally, by not considering Gray map, used in the previous schemes, we give a third scheme on Galois rings, which generalizes the scheme over finite fields given in [8]. The introduced schemes obtain optimal impersonation and substitution probabilities.
Keywords: 
;  ;  
Copyright: This open access article is published under a Creative Commons CC BY 4.0 license, which permit the free download, distribution, and reuse, provided that the author and preprint are cited in any reuse.
Prerpints.org logo

Preprints.org is a free preprint server supported by MDPI in Basel, Switzerland.

Subscribe

Disclaimer

Terms of Use

Privacy Policy

Privacy Settings

© 2025 MDPI (Basel, Switzerland) unless otherwise stated