Article
Version 1
This version is not peer-reviewed
Three Authentication Schemes Based on Finite Fields and Galois Rings
Version 1
: Received: 25 January 2021 / Approved: 26 January 2021 / Online: 26 January 2021 (13:25:14 CET)
Version 2 : Received: 24 March 2021 / Approved: 25 March 2021 / Online: 25 March 2021 (16:00:52 CET)
Version 2 : Received: 24 March 2021 / Approved: 25 March 2021 / Online: 25 March 2021 (16:00:52 CET)
How to cite: Ku-Cauich, J.C.; Márquez-Hidalgo, M.A. Three Authentication Schemes Based on Finite Fields and Galois Rings. Preprints 2021, 2021010540 Ku-Cauich, J.C.; Márquez-Hidalgo, M.A. Three Authentication Schemes Based on Finite Fields and Galois Rings. Preprints 2021, 2021010540
Abstract
We give three new systematic authentication schemes, two using Gray map, finite fields and Galois rings, and one using only Galois rings. In the first scheme, we increase the size and simplify the scheme’s source space in [9]. In the second scheme, we reduce the key space of the first scheme. Finally, by not considering Gray map, used in the previous schemes, we give a third scheme on Galois rings, which generalizes the scheme over finite fields given in [8]. The introduced schemes obtain optimal impersonation and substitution probabilities.
Keywords
Authentication Schemwes; Galois Rings; Gray map
Subject
Computer Science and Mathematics, Algebra and Number Theory
Copyright: This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Comments (0)
We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.
Leave a public commentSend a private comment to the author(s)
* All users must log in before leaving a comment