Working Paper Article Version 1 This version is not peer-reviewed

Three Authentication Schemes Based on Finite Fields and Galois Rings

Version 1 : Received: 25 January 2021 / Approved: 26 January 2021 / Online: 26 January 2021 (13:25:14 CET)
Version 2 : Received: 24 March 2021 / Approved: 25 March 2021 / Online: 25 March 2021 (16:00:52 CET)

How to cite: Ku-Cauich, J.C.; Márquez-Hidalgo, M.A. Three Authentication Schemes Based on Finite Fields and Galois Rings. Preprints 2021, 2021010540 Ku-Cauich, J.C.; Márquez-Hidalgo, M.A. Three Authentication Schemes Based on Finite Fields and Galois Rings. Preprints 2021, 2021010540

Abstract

We give three new systematic authentication schemes, two using Gray map, finite fields and Galois rings, and one using only Galois rings. In the first scheme, we increase the size and simplify the scheme’s source space in [9]. In the second scheme, we reduce the key space of the first scheme. Finally, by not considering Gray map, used in the previous schemes, we give a third scheme on Galois rings, which generalizes the scheme over finite fields given in [8]. The introduced schemes obtain optimal impersonation and substitution probabilities.

Keywords

Authentication Schemwes; Galois Rings; Gray map

Subject

Computer Science and Mathematics, Algebra and Number Theory

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.