{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T04:59:03Z","timestamp":1764997143842,"version":"3.37.3"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2017,10,19]],"date-time":"2017-10-19T00:00:00Z","timestamp":1508371200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"National Natural Science Foundation of China (CN)","award":["11501161","11301370"],"award-info":[{"award-number":["11501161","11301370"]}]},{"name":"National Natural Science Foundation of China (CN)","award":["11571251"],"award-info":[{"award-number":["11571251"]}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2016M601873"],"award-info":[{"award-number":["2016M601873"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003787","name":"Natural Science Foundation of Hebei Province","doi-asserted-by":"publisher","award":["A2016402164"],"award-info":[{"award-number":["A2016402164"]}],"id":[{"id":"10.13039\/501100003787","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100013088","name":"Qing Lan Project","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100013088","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2018,8]]},"DOI":"10.1007\/s10623-017-0421-x","type":"journal-article","created":{"date-parts":[[2017,10,19]],"date-time":"2017-10-19T06:50:23Z","timestamp":1508395823000},"page":"1739-1755","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["A construction for optimal c-splitting authentication and secrecy codes"],"prefix":"10.1007","volume":"86","author":[{"given":"Mingchao","family":"Li","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8077-940X","authenticated-orcid":false,"given":"Miao","family":"Liang","sequence":"additional","affiliation":[]},{"given":"Beiliang","family":"Du","sequence":"additional","affiliation":[]},{"given":"Jingyuan","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,19]]},"reference":[{"issue":"3","key":"421_CR1","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1007\/s001459900049","volume":"12","author":"C Blundo","year":"1999","unstructured":"Blundo C., De Santis A., Kurosawa K., Ogata W.: On a fallacious bound for authentication codes. J. Cryptol. 12(3), 155\u2013159 (1999).","journal-title":"J. Cryptol."},{"issue":"2","key":"421_CR2","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1023\/A:1008270111149","volume":"13","author":"LRA Casse","year":"1998","unstructured":"Casse L.R.A., Martin K.M., Wild P.R.: Bounds and characterizations of authentication\/secrecy schemes. Des. Codes Cryptogr. 13(2), 107\u2013129 (1998).","journal-title":"Des. Codes Cryptogr."},{"issue":"5","key":"421_CR3","doi-asserted-by":"crossref","first-page":"346","DOI":"10.1002\/jcd.20011","volume":"12","author":"Y Chang","year":"2004","unstructured":"Chang Y., Ji L.: Optimal \n                        $$(4up, 5, 1)$$\n                        \n                            \n                                \n                                    (\n                                    4\n                                    u\n                                    p\n                                    ,\n                                    5\n                                    ,\n                                    1\n                                    )\n                                \n                            \n                        \n                     optical orthogonal codes. J. Combin. Des. 12(5), 346\u2013361 (2004).","journal-title":"J. Combin. Des."},{"issue":"1","key":"421_CR4","doi-asserted-by":"crossref","first-page":"59","DOI":"10.3934\/amc.2011.5.59","volume":"5","author":"YM Chee","year":"2011","unstructured":"Chee Y.M., Zhang X., Zhang H.: Infinite families of optimal authentication codes secure against spoofing attacks of highter order. Adv. Math. Commun. 5(1), 59\u201368 (2011).","journal-title":"Adv. Math. Commun."},{"issue":"1","key":"421_CR5","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1016\/0097-3165(92)90099-G","volume":"59","author":"CJ Colbourn","year":"1992","unstructured":"Colbourn C.J., Hoffman D.G., Rees R.: A new class of group divisible designs with block size three. J. Combin. Theory Ser A. 59(1), 73\u201389 (1992).","journal-title":"J. Combin. Theory Ser A."},{"issue":"3","key":"421_CR6","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1007\/BF00196910","volume":"3","author":"M Soete De","year":"1991","unstructured":"De Soete M.: New bounds and constructions for authentication\/secrecy codes with splitting. J. Cryptol. 3(3), 173\u2013186 (1991).","journal-title":"J. Cryptol."},{"issue":"2\u20133","key":"421_CR7","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1016\/j.jpaa.2004.08.008","volume":"196","author":"C Ding","year":"2005","unstructured":"Ding C., Salomaa A., Sol\u00e9 P., Tian X.: Three constructions of authenticaton\/secrecy codes. Journal of Pure and Applied Algebra. 196(2\u20133), 149\u2013168 (2005).","journal-title":"Journal of Pure and Applied Algebra."},{"issue":"6","key":"421_CR8","doi-asserted-by":"crossref","first-page":"404","DOI":"10.1002\/jcd.20025","volume":"12","author":"B Du","year":"2004","unstructured":"Du B.: Splitting balanced incomplete block designs with block size \n                        $$3\\times 2$$\n                        \n                            \n                                \n                                    3\n                                    \u00d7\n                                    2\n                                \n                            \n                        \n                    . J. Combin. Des. 12(6), 404\u2013420 (2004).","journal-title":"J. Combin. Des."},{"key":"421_CR9","first-page":"287","volume":"31","author":"B Du","year":"2005","unstructured":"Du B.: Splitting balanced incomplete block designs. Australas. J. Combin. 31, 287\u2013298 (2005).","journal-title":"Australas. J. Combin."},{"issue":"5","key":"421_CR10","doi-asserted-by":"crossref","first-page":"365","DOI":"10.1002\/(SICI)1520-6610(1996)4:5<365::AID-JCD5>3.0.CO;2-D","volume":"4","author":"G Ge","year":"1996","unstructured":"Ge G., Zhu L.: Authentication perpendicular arrays \n                        $$APA_{1}(2,5, v)$$\n                        \n                            \n                                \n                                    A\n                                    P\n                                    \n                                        A\n                                        1\n                                    \n                                    \n                                        (\n                                        2\n                                        ,\n                                        5\n                                        ,\n                                        v\n                                        )\n                                    \n                                \n                            \n                        \n                    . J. Combin. Des. 4(5), 365\u2013375 (1996).","journal-title":"J. Combin. Des."},{"issue":"2","key":"421_CR11","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1002\/(SICI)1520-6610(1997)5:2<111::AID-JCD3>3.0.CO;2-I","volume":"5","author":"G Ge","year":"1997","unstructured":"Ge G., Zhu L.: Authentication perpendicular arrays \n                        $$APA_{1}(2,7, v)$$\n                        \n                            \n                                \n                                    A\n                                    P\n                                    \n                                        A\n                                        1\n                                    \n                                    \n                                        (\n                                        2\n                                        ,\n                                        7\n                                        ,\n                                        v\n                                        )\n                                    \n                                \n                            \n                        \n                    . J. Combin. Des. 5(2), 111\u2013124 (1997).","journal-title":"J. Combin. Des."},{"issue":"4","key":"421_CR12","doi-asserted-by":"crossref","first-page":"663","DOI":"10.1137\/S0895480103435469","volume":"18","author":"G Ge","year":"2005","unstructured":"Ge G., Miao Y., Wang L.: Combinatorial constructions for optimal splitting authentication codes. SIAM J. Discret. Math. 18(4), 663\u2013678 (2005).","journal-title":"SIAM J. Discret. Math."},{"key":"421_CR13","unstructured":"Huber M.: Information theoretic authentication and secrecy codes in the splitting model. \n                        arXiv:1112.0038\n                        \n                    ."},{"issue":"2","key":"421_CR14","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1007\/s12095-010-0020-4","volume":"2","author":"M Huber","year":"2010","unstructured":"Huber M.: Combinatorial bounds and characterizations of splitting authentication codes. Cryptogr. Commun. 2(2), 173\u2013185 (2010).","journal-title":"Cryptogr. Commun."},{"issue":"3","key":"421_CR15","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1007\/s10623-010-9433-5","volume":"60","author":"M Liang","year":"2011","unstructured":"Liang M., Du B.: A new class of splitting \n                        $$3$$\n                        \n                            \n                                \n                                    3\n                                \n                            \n                        \n                    -designs. Des. Codes Cryptogr. 60(3), 283\u2013290 (2011).","journal-title":"Des. Codes Cryptogr."},{"issue":"3","key":"421_CR16","doi-asserted-by":"crossref","first-page":"407","DOI":"10.1007\/s12095-015-0179-9","volume":"9","author":"M Liang","year":"2017","unstructured":"Liang M., Ji L., Zhang J.: Some new classes of \n                        $$2$$\n                        \n                            \n                                \n                                    2\n                                \n                            \n                        \n                    -fold optimal or perfect splitting authentication codes. Cryptogr. Commun. 9(3), 407\u2013430 (2017).","journal-title":"Cryptogr. Commun."},{"key":"421_CR17","first-page":"225","volume-title":"Finite Fields","author":"R Lidl","year":"1997","unstructured":"Lidl R., Niederreiter H.: Finite Fields, pp. 225\u2013226. Cambridge University Press, Cambridge (1997)."},{"key":"421_CR18","first-page":"3","volume-title":"Digital Communications","author":"JL Massey","year":"1986","unstructured":"Massey J.L.: Cryptographya selective survey. In: Biglier E., Prati G. (eds.) Digital Communications, pp. 3\u201321. North-Holland, Amsterdam, New York, Oxford (1986)."},{"issue":"1\u20133","key":"421_CR19","doi-asserted-by":"crossref","first-page":"383","DOI":"10.1016\/S0012-365X(03)00283-8","volume":"279","author":"W Ogata","year":"2004","unstructured":"Ogata W., Kurosawa K., Stinson D.R., Saido H.: New combinatorial designs and their applications to authentication codes and secret sharing schemes. Discret. Math. 279(1\u20133), 383\u2013405 (2004).","journal-title":"Discret. Math."},{"key":"421_CR20","first-page":"413","volume":"34","author":"GJ Simmons","year":"1982","unstructured":"Simmons G.J.: A game theory model of digital message authentication. Congr. Numer. 34, 413\u2013424 (1982).","journal-title":"Congr. Numer."},{"key":"421_CR21","first-page":"161","volume":"45","author":"GJ Simmons","year":"1984","unstructured":"Simmons G.J.: Message authentication: a game on hypergraphs. Congr. Numer. 45, 161\u2013192 (1984).","journal-title":"Congr. Numer."},{"key":"421_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"411","DOI":"10.1007\/3-540-39568-7_32","volume-title":"Advances in Cryptology-CRYPTO 1984","author":"GJ Simmons","year":"1985","unstructured":"Simmons G.J.: Authentication theorey\/coding theory. In: Blakley G.R., Chaum D. (eds.) Advances in Cryptology-CRYPTO 1984, vol. 196, pp. 411\u2013431. Lecture Notes in Computer ScienceSpringer, Berlin, Heidelberg, New York (1985)."},{"key":"421_CR23","first-page":"379","volume-title":"Contemporary Cryptology: The Science of Information Integrity","author":"GJ Simmons","year":"1992","unstructured":"Simmons G.J.: A survey of information authentication. In: Simmons G.J. (ed.) Contemporary Cryptology: The Science of Information Integrity, pp. 379\u2013419. IEEE Press, Piscataway (1992)."},{"issue":"1","key":"421_CR24","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1007\/BF00206324","volume":"1","author":"DR Stinson","year":"1988","unstructured":"Stinson D.R.: Some constructions and bounds for authentication codes. J. Cryptol. 1(1), 37\u201351 (1988).","journal-title":"J. Cryptol."},{"issue":"2","key":"421_CR25","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1007\/BF02351720","volume":"1","author":"DR Stinson","year":"1988","unstructured":"Stinson D.R.: A construction for authentication\/secrecy codes from certain combinatorial designs. J. Cryptol. 1(2), 119\u2013127 (1988).","journal-title":"J. Cryptol."},{"issue":"1","key":"421_CR26","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1007\/BF02252868","volume":"2","author":"DR Stinson","year":"1990","unstructured":"Stinson D.R.: The combinatorics of authentication and secrecy codes. J. Cryptol. 2(1), 23\u201349 (1990).","journal-title":"J. Cryptol."},{"issue":"1","key":"421_CR27","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1016\/S0195-6698(13)80058-3","volume":"11","author":"DR Stinson","year":"1990","unstructured":"Stinson D.R., Teirlink L.: A construction for authentication\/secrecy codes from \n                        $$3$$\n                        \n                            \n                                \n                                    3\n                                \n                            \n                        \n                    -homogeneous permutation groups. Eur. J. Combin. 11(1), 73\u201379 (1990).","journal-title":"Eur. J. Combin."},{"issue":"3","key":"421_CR28","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1007\/BF01388389","volume":"5","author":"VT Tran","year":"1995","unstructured":"Tran V.T.: On the construction of authentication and secrecy codes. Des. Codes Cryptogr. 5(3), 269\u2013280 (1995).","journal-title":"Des. Codes Cryptogr."},{"issue":"3","key":"421_CR29","doi-asserted-by":"crossref","first-page":"373","DOI":"10.1007\/s10623-005-1501-x","volume":"38","author":"J Wang","year":"2006","unstructured":"Wang J.: A new class of optimal 3-splitting authentication codes. Des. Codes Cryptogr. 38(3), 373\u2013381 (2006).","journal-title":"Des. Codes Cryptogr."},{"issue":"3","key":"421_CR30","doi-asserted-by":"crossref","first-page":"791","DOI":"10.1007\/s10440-008-9346-8","volume":"109","author":"J Wang","year":"2010","unstructured":"Wang J., Su R.: Further results on the existence of splitting BIBDs and application to authentication codes. Acta Appl. Math. 109(3), 791\u2013803 (2010).","journal-title":"Acta Appl. Math."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-017-0421-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-017-0421-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-017-0421-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,18]],"date-time":"2020-05-18T10:59:23Z","timestamp":1589799563000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-017-0421-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10,19]]},"references-count":30,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2018,8]]}},"alternative-id":["421"],"URL":"https:\/\/doi.org\/10.1007\/s10623-017-0421-x","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"type":"print","value":"0925-1022"},{"type":"electronic","value":"1573-7586"}],"subject":[],"published":{"date-parts":[[2017,10,19]]}}}