{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T22:05:26Z","timestamp":1768341926780,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540577669","type":"print"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-48329-2_29","type":"book-chapter","created":{"date-parts":[[2007,8,6]],"date-time":"2007-08-06T01:25:55Z","timestamp":1186363555000},"page":"343-354","source":"Crossref","is-referenced-by-count":8,"title":["On the Construction of Perfect Authentication Codes that Permit Arbitration"],"prefix":"10.1007","author":[{"given":"Thomas","family":"Johansson","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"29_CR1","doi-asserted-by":"crossref","first-page":"405","DOI":"10.1002\/j.1538-7305.1974.tb02751.x","volume":"53","author":"E.N. Gilbert","year":"1974","unstructured":"E.N. Gilbert, F.J. MacWilliams and N.J.A. Sloane, \u201cCodes which detect deception\u201d, Bell Syst. Tech. J., Vol. 53, 1974, pp. 405\u2013424.","journal-title":"Bell Syst. Tech. J."},{"key":"29_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"411","DOI":"10.1007\/3-540-39568-7_32","volume-title":"Advances in Cryptology, Proceedings of CRYPTO 84","author":"G.J. Simmons","year":"1985","unstructured":"G.J. Simmons, \u201cAuthentication theory\/coding theory\u201d, in Advances in Cryptology, Proceedings of CRYPTO 84, G.R. Blakley and D. Chaum, Eds. Lecture notes in Computer Science, No. 196. New York, NY: Springer, 1985, pp. 411\u2013431."},{"key":"29_CR3","unstructured":"J.L. Massey, \u201cContemporary Cryptology, An Introduction\u201d, in Contemporary Cryptology, The Science of Information Integrity, G.J Simmons, Ed., IEEE Press, 1991, pp. 3\u201339."},{"key":"29_CR4","volume-title":"Contemporary Cryptology, The science of information integrity","author":"G.J. Simmons","year":"1992","unstructured":"G.J. Simmons, \u201cA survey of Information Authentication\u201d, in Contemporary Cryptology, The science of information integrity, ed. G.J. Simmons, IEEE Press, New York, 1992."},{"issue":"1","key":"29_CR5","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1007\/BF02252868","volume":"2","author":"D.R. Stinson","year":"1990","unstructured":"D.R. Stinson, \u201cThe combinatorics of authentication and secrecy codes\u201d, Journal of Cryptology, Vol. 2, no 1, 1990, pp. 23\u201349.","journal-title":"Journal of Cryptology"},{"key":"29_CR6","doi-asserted-by":"crossref","unstructured":"D. R. Stinson, \u201cUniversal hashing and authentication codes\u201d Proceedings of Crypto 91, Santa Barbara, USA, 1991, pp 74\u201385.","DOI":"10.1007\/3-540-46766-1_5"},{"key":"29_CR7","unstructured":"T. Johansson, G. Kabatianskii, B. Smeets, \u201cOn the relation between A-codes and codes correcting independent errors\u201d Proceedings Eurocrypt\u201993, to appear."},{"key":"29_CR8","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/BF00204449","volume":"2","author":"G.J. Simmons","year":"1990","unstructured":"G.J. Simmons, \u201cA Cartesian Product Construction for Unconditionally Secure Authentication Codes that Permit Arbitration\u201d, in Journal of Cryptology, Vol. 2, no. 2, 1990, pp. 77\u2013104.","journal-title":"Journal of Cryptology"},{"key":"29_CR9","first-page":"151","volume-title":"Proceedings of Eurocrypt\u2019 87","author":"G.J. Simmons","year":"1988","unstructured":"G.J. Simmons, \u201cMessage authentication with arbitration of transmitter\/receiver disputes\u201d, in Proceedings of Eurocrypt\u2019 87, D. Chaum and W.L. Price, Eds., Amsterdam, The Netherlands, April 13\u201315, 1987, pp. 151\u2013165. Berlin: Springer-Verlag, 1988."},{"key":"29_CR10","doi-asserted-by":"crossref","unstructured":"T. Johansson, \u201cLower Bounds on the Probability of Deception in Authentication with Arbitration\u201d, in Proceedings of 199S IEEE International Symposium on Information Theory, San Antonio, USA, January 17\u201322, 1993, p. 231.","DOI":"10.1109\/ISIT.1993.748545"},{"key":"29_CR11","first-page":"51","volume-title":"Procceedings of Eurocrypt\u2019 88","author":"E.F. Brickell","year":"1988","unstructured":"E.F. Brickell D.R. Stinson, \u201cAuthentication codes with multiple arbiters\u201d, in Procceedings of Eurocrypt\u2019 88, C.G G\u00fcnter, Ed., Davos, Switzerland, May 25\u201327, 1988, pp. 51\u201355, Berlin: Springer-Verlag, 1988."},{"key":"29_CR12","unstructured":"Y. Desmedt, M. Yung, \u201cAsymmetric and Securely-Arbitrated Unconditional Authentication Systems\u201d, submitted to IEEE Transactions on Information Theory. A part of this paper was presented at Crypto\u201990."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO\u2019 93"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48329-2_29.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T04:20:36Z","timestamp":1737346836000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48329-2_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540577669"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/3-540-48329-2_29","relation":{},"subject":[]}}