{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T13:55:15Z","timestamp":1753883715940},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[1995,11,1]],"date-time":"1995-11-01T00:00:00Z","timestamp":815184000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des Codes Crypt"],"published-print":{"date-parts":[[1995,11]]},"DOI":"10.1007\/bf01388475","type":"journal-article","created":{"date-parts":[[2005,4,2]],"date-time":"2005-04-02T09:27:06Z","timestamp":1112434026000},"page":"205-218","source":"Crossref","is-referenced-by-count":11,"title":["Authentication codes for nontrusting parties obtained from rank metric codes"],"prefix":"10.1007","volume":"6","author":[{"given":"Thomas","family":"Johansson","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"CR1","doi-asserted-by":"crossref","unstructured":"E. F. Brickell and D. R. Stinson, Authentication codes with multiple arbiters,Proceedings of Eurocrypt'88, Davos, Switzerland, 1988, LNCS 330, Springer-Verlag, Berlin, pp. 51?55.","DOI":"10.1007\/3-540-45961-8_5"},{"key":"CR2","doi-asserted-by":"crossref","unstructured":"Y. Desmedt and M. Yung, Asymmetric and securely-arbitrated unconditional authentication systems, submitted. A part of this paper appears as Arbitrated unconditionally secure authentication can be unconditionally protected against arbiter's attack,Proceedings of Crypto'90, Santa Barbara, USA, 1990, LNCS 537, Springer-Verlag, Berlin, pp. 177?188.","DOI":"10.1007\/3-540-38424-3_13"},{"key":"CR3","unstructured":"E. M. Gabidulin, private communication, Feb. 1994."},{"issue":"No. 1","key":"CR4","first-page":"1","volume":"21","author":"E. M. Gabidulin","year":"1985","unstructured":"E. M. Gabidulin, Theory of codes with maximum rank distance,Problems of Information Transmission, Vol. 21, No. 1 (1985) pp. 1?12. Russian original, January?March, 1985.","journal-title":"Problems of Information Transmission"},{"key":"CR5","doi-asserted-by":"crossref","first-page":"405","DOI":"10.1002\/j.1538-7305.1974.tb02751.x","volume":"53","author":"E. N. Gilbert","year":"1974","unstructured":"E. N. Gilbert, F. J. MacWilliams, and N. J. A. Sloane, Codes which detect deception,Bell Syst. Tech. J., Vol. 53 (1974) pp. 405?424.","journal-title":"Bell Syst. Tech. J."},{"issue":"No. 5","key":"CR6","doi-asserted-by":"crossref","first-page":"1678","DOI":"10.1109\/18.333893","volume":"40","author":"T. Johansson","year":"1994","unstructured":"T. Johansson, Lower bounds on the probability of deception in authentication with arbitration,IEEE Trans. on Information Theory, Vol. 40, No. 5 (1994) pp. 1678?1681.","journal-title":"IEEE Trans. on Information Theory"},{"key":"CR7","unstructured":"T. Johansson, OnA 2-codes including arbiter's attacks, preprint."},{"key":"CR8","doi-asserted-by":"crossref","unstructured":"T. Johansson, On the construction of perfect authentication codes that permit arbitration,Proceedings of Crypto'93, Santa Barbara, USA, 1993, LNCS 773, Springer-Verlag, Berlin, pp. 343?354.","DOI":"10.1007\/3-540-48329-2_29"},{"key":"CR9","doi-asserted-by":"crossref","unstructured":"T. Johansson, G. Kabatianskii, and B. Smeets, On the relation between A-codes and codes correcting independent errors,Proceedings of Eurocrypt'93, Bergen, Norway, 1993, LNCS 765, Springer-Verlag, Berlin, pp. 1?11.","DOI":"10.1007\/3-540-48285-7_1"},{"key":"CR10","unstructured":"R. Lidl and H. Niederreiter, Finite fields,Encyclopedia of Mathematics and its Applications, Vol. 20, Addison-Wesley, 1983."},{"key":"CR11","first-page":"3","volume-title":"Contemporary Cryptology, The Science of Information Integrity","author":"J. L. Massey","year":"1992","unstructured":"J. L. Massey, Contemporary cryptology, an introduction, inContemporary Cryptology, The Science of Information Integrity, G. J. Simmons, ed., IEEE Press, New York (1992) pp. 3?39."},{"key":"CR12","volume-title":"Coding and Information Theory","author":"S. Roman","year":"1992","unstructured":"S. Roman,Coding and Information Theory, Springer-Verlag, New York (1992)."},{"issue":"No. 2","key":"CR13","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1007\/BF00204449","volume":"2","author":"G. J. Simmons","year":"1990","unstructured":"G. J. Simmons, A cartesian product construction for unconditionally secure authentication codes that permit arbitration,Journal of Cryptology, Vol. 2, No. 2 (1990) pp. 77?104.","journal-title":"Journal of Cryptology"},{"key":"CR14","first-page":"379","volume-title":"Contemporary Cryptology, The Science of Information Integrity","author":"G. J. Simmons","year":"1992","unstructured":"G. J. Simmons, A survey of information authentication, inContemporary Cryptology, The Science of Information Integrity, G. J. Simmons, ed. IEEE Press, New York (1992), pp. 379?420."},{"key":"CR15","doi-asserted-by":"crossref","unstructured":"G. J. Simmons, Authentication theory\/coding theory, inAdvances in Cryptology,Proceedings of Crypto'84, Santa Barbara, USA, 1984, LNCS 196, Springer-Verlag, Berlin, pp. 411?431.","DOI":"10.1007\/3-540-39568-7_32"},{"key":"CR16","doi-asserted-by":"crossref","unstructured":"G. J. Simmons, Message authentication with arbitration of transmitter\/receiver disputes,Proceedings of Eurocrypt'87, Amsterdam, The Netherlands, 1987, LNCS 304, Springer-Verlag, Berlin, pp. 151?165.","DOI":"10.1007\/3-540-39118-5_15"},{"issue":"No. 1","key":"CR17","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1007\/BF02252868","volume":"2","author":"D. R. Stinson","year":"1990","unstructured":"D. R. Stinson, The combinatorics of authentication and secrecy codes,Journal of Cryptology, Vol. 2, No. 1 (1990) pp. 23?49.","journal-title":"Journal of Cryptology"},{"key":"CR18","doi-asserted-by":"crossref","unstructured":"D. R. Stinson, Universal hashing and authentication codesProceedings of Crypto'91, Santa Barbara, USA, 1991, LNCS 576, Springer-Verlag, Berlin, pp. 74?85.","DOI":"10.1007\/3-540-46766-1_5"},{"key":"CR19","volume-title":"Introduction to Abstract and Linear Algebra","author":"Z. Wan","year":"1992","unstructured":"Z. Wan,Introduction to Abstract and Linear Algebra, Studentlitteratur, Lund (1992)."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/BF01388475\/fulltext.html","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF01388475.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/BF01388475\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF01388475","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,6]],"date-time":"2020-04-06T16:35:46Z","timestamp":1586190946000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BF01388475"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995,11]]},"references-count":19,"journal-issue":{"issue":"3","published-print":{"date-parts":[[1995,11]]}},"alternative-id":["BF01388475"],"URL":"https:\/\/doi.org\/10.1007\/bf01388475","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[1995,11]]}}}