{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:23:01Z","timestamp":1740122581370,"version":"3.37.3"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2019,1,5]],"date-time":"2019-01-05T00:00:00Z","timestamp":1546646400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["11301370","11571251"],"award-info":[{"award-number":["11301370","11571251"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2016M601873"],"award-info":[{"award-number":["2016M601873"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Qing Lan Project of Jiangsu Province"},{"name":"Qing Lan Project of Suzhou Vocational University"},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["11431003"],"award-info":[{"award-number":["11431003"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Project Funded by the Priority Academic Program Development of Jiangsu Higher Education Institutions"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.1007\/s10623-018-00602-9","type":"journal-article","created":{"date-parts":[[2019,1,5]],"date-time":"2019-01-05T03:53:53Z","timestamp":1546660433000},"page":"2003-2026","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["On (t,\u00a0L)-fold perfect authentication and secrecy codes with arbitration"],"prefix":"10.1007","volume":"87","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8077-940X","authenticated-orcid":false,"given":"Miao","family":"Liang","sequence":"first","affiliation":[]},{"given":"Lijun","family":"Ji","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,5]]},"reference":[{"issue":"1","key":"602_CR1","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1007\/s10623-014-0001-2","volume":"77","author":"J Bao","year":"2015","unstructured":"Bao J., Ji L.: The completion determination of optimal $$(3,4)$$ ( 3 , 4 ) -packings. Des. Codes Cryptogr. 77(1), 217\u2013229 (2015).","journal-title":"Des. Codes Cryptogr."},{"issue":"3","key":"602_CR2","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1214\/aoms\/1177729449","volume":"23","author":"KA Bush","year":"1952","unstructured":"Bush K.A.: Orthogonal arrays of index unity. Ann. Math. Stat. 23(3), 293\u2013295 (1952).","journal-title":"Ann. Math. Stat."},{"issue":"3","key":"602_CR3","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1007\/BF00196910","volume":"3","author":"M Soete De","year":"1991","unstructured":"De Soete M.: New bounds and constructions for Authentication\/secrecy codes with splitting. J. Cryptol. 3(3), 173\u2013186 (1991).","journal-title":"J. Cryptol."},{"issue":"2","key":"602_CR4","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/s11766-007-0205-6","volume":"22","author":"B Du","year":"2007","unstructured":"Du B.: Existence of optimal strong partially balanced designs. Appl. Math. J. Chin. Univ. Ser. B 22(2), 169\u2013173 (2007).","journal-title":"Appl. Math. J. Chin. Univ. Ser. B"},{"issue":"1\u20133","key":"602_CR5","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1016\/S0012-365X(03)00268-1","volume":"279","author":"B Du","year":"2004","unstructured":"Du B.: Existence of optimal strong partially balanced designs with block size five. Discret. Math. 279(1\u20133), 173\u2013190 (2004).","journal-title":"Discret. Math."},{"issue":"1\u20133","key":"602_CR6","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.disc.2004.09.002","volume":"288","author":"B Du","year":"2004","unstructured":"Du B.: The spectrum of optimal strong partially balanced designs with block size five. Discret. Math. 288(1\u20133), 19\u201328 (2004).","journal-title":"Discret. Math."},{"issue":"2","key":"602_CR7","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1002\/jcd.10062","volume":"12","author":"G Ge","year":"2004","unstructured":"Ge G., Ling A.C.H.: Some more $$5$$ 5 -GDDs and optimal ( $$v,5,1$$ v , 5 , 1 )-packings. J. Comb. Des. 12(2), 132\u2013141 (2004).","journal-title":"J. Comb. Des."},{"issue":"3","key":"602_CR8","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/s10623-006-0021-7","volume":"40","author":"G Ge","year":"2006","unstructured":"Ge G., Miao Y., Zhu L.: GOB designs for authentication codes with arbitration. Des. Codes Cryptogr. 40(3), 303\u2013317 (2006).","journal-title":"Des. Codes Cryptogr."},{"issue":"3","key":"602_CR9","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1016\/0012-365X(75)90040-0","volume":"11","author":"H Hanani","year":"1975","unstructured":"Hanani H.: Balanced incomplete block designs and related designs. Discret. Math. 11(3), 255\u2013369 (1975).","journal-title":"Discret. Math."},{"issue":"5","key":"602_CR10","doi-asserted-by":"publisher","first-page":"1573","DOI":"10.1109\/18.333869","volume":"40","author":"T Johansson","year":"1994","unstructured":"Johansson T.: Lower bounds on the probability of deception in authentication with arbitration. IEEE Trans. Inf. Theory. 40(5), 1573\u20131585 (1994).","journal-title":"IEEE Trans. Inf. Theory."},{"issue":"1","key":"602_CR11","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/s10623-004-5662-9","volume":"38","author":"L Ji","year":"2006","unstructured":"Ji L.: Asymptotic determination of the last packing number of quadruples. Des. Codes Cryptogr. 38(1), 83\u201395 (2006).","journal-title":"Des. Codes Cryptogr."},{"issue":"1","key":"602_CR12","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/s10623-014-0032-8","volume":"79","author":"L Ji","year":"2016","unstructured":"Ji L., Dong Z.: Existence of optimal strong partially balanced $$3$$ 3 -designs with block size four. Des. Codes Cryptogr. 79(1), 19\u201336 (2016).","journal-title":"Des. Codes Cryptogr."},{"issue":"3","key":"602_CR13","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1016\/j.jcta.2009.06.002","volume":"117","author":"L Ji","year":"2010","unstructured":"Ji L., Yin J.: Constructions of new orthogonal arrays and covering arrays of strength three. J. Comb. Theory Ser. A. 117(3), 236\u2013347 (2010).","journal-title":"J. Comb. Theory Ser. A."},{"issue":"8","key":"602_CR14","doi-asserted-by":"publisher","first-page":"1739","DOI":"10.1007\/s10623-017-0421-x","volume":"86","author":"M Li","year":"2018","unstructured":"Li M., Liang M., Du B., Chen J.: A construction for optimal c-splitting authentication and secrecy codes. Des. Codes Cryptogr. 86(8), 1739\u20131755 (2018).","journal-title":"Des. Codes Cryptogr."},{"issue":"1","key":"602_CR15","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/s10623-016-0201-z","volume":"83","author":"X Lu","year":"2017","unstructured":"Lu X., Jimbo M.: Affine-invariant strictly cyclic Steiner quadruple systems. Des. Codes Cryptogr. 83(1), 33\u201369 (2017).","journal-title":"Des. Codes Cryptogr."},{"issue":"1","key":"602_CR16","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/s10623-011-9496-y","volume":"62","author":"M Liang","year":"2012","unstructured":"Liang M., Du B.: A new class of $$3$$ 3 -fold perfect splitting authentication codes. Des. Codes Cryptogr. 62(1), 109\u2013119 (2012).","journal-title":"Des. Codes Cryptogr."},{"issue":"3","key":"602_CR17","doi-asserted-by":"publisher","first-page":"781","DOI":"10.1007\/s10623-013-9826-3","volume":"73","author":"M Liang","year":"2014","unstructured":"Liang M., Li M., Du B.: A construction for $$t$$ t -fold perfect authentication codes with arbitration. Des. Codes Cryptogr. 73(3), 781\u2013790 (2014).","journal-title":"Des. Codes Cryptogr."},{"key":"602_CR18","first-page":"129","volume":"79","author":"WH Mills","year":"1990","unstructured":"Mills W.H.: On the existence of H designs. Congr. Numer. 79, 129\u2013141 (1990).","journal-title":"Congr. Numer."},{"key":"602_CR19","first-page":"371","volume-title":"Contemporary Design Theory","author":"WH Mills","year":"1992","unstructured":"Mills W.H., Mullin R.C.: Coverings and packings. In: Dinitz J.H., Stinson D.R. (eds.) Contemporary Design Theory, pp. 371\u2013399. Wiley, New York (1992)."},{"issue":"3","key":"602_CR20","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1023\/A:1008326209304","volume":"20","author":"S Obana","year":"2000","unstructured":"Obana S., Kurosawa K.: Combinatorial classification of optimal authentication codes with arbitration. Des. Codes Cryptogr. 20(3), 281\u2013305 (2000).","journal-title":"Des. Codes Cryptogr."},{"key":"602_CR21","unstructured":"Pei D., Li Y., Wang Y., Safavi-Naini R.: Characterization of authentication codes with arbitration. Lecture Notes in Computer Science, vol. 1587, pp. 303\u2013313. Springer, Berlin (1999)."},{"key":"602_CR22","doi-asserted-by":"crossref","DOI":"10.1201\/9781420003185","volume-title":"Authentication Codes and Combinatorial Designs","author":"D Pei","year":"2006","unstructured":"Pei D.: Authentication Codes and Combinatorial Designs. Chapman Hall\/CRC, Boca Raton (2006)."},{"key":"602_CR23","volume-title":"Message authentication codes (in Chinese)","author":"D Pei","year":"2009","unstructured":"Pei D.: Message authentication codes (in Chinese). Press: USCT, Hefei (2009)."},{"key":"602_CR24","unstructured":"Simmons G.J.: Message authentication with arbitration of transmitter\/receiver disputes. In: Blakley, G.R., Chaum, D. (eds.) Advances in Cryptology-EUROCRYPT 1987, Lecture Notes in Computer Science, vol. 304, pp. 151\u2013165. Springer, Berlin (1998)."},{"issue":"2","key":"602_CR25","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/BF02351720","volume":"1","author":"DR Stinson","year":"1998","unstructured":"Stinson D.R.: A construction for authentication\/secrecy codes from certain combinatorial designs. J. Cryptol. 1(2), 119\u2013127 (1998).","journal-title":"J. Cryptol."},{"issue":"1","key":"602_CR26","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1007\/BF02252868","volume":"2","author":"DR Stinson","year":"1990","unstructured":"Stinson D.R.: The combinatorics of authentication and secrecy codes. J. Cryptol. 2(1), 23\u201349 (1990).","journal-title":"J. Cryptol."},{"key":"602_CR27","first-page":"205","volume":"37","author":"Y Wang","year":"2001","unstructured":"Wang Y., Safavi-Naini R., Pei D.: Combinatorial characterisation of $$l$$ l -optimal authentication codes with arbitration. J. Comb. Math. Comb. Comput. 37, 205\u2013224 (2001).","journal-title":"J. Comb. Math. Comb. Comput."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-018-00602-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-018-00602-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-018-00602-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,21]],"date-time":"2020-11-21T19:28:46Z","timestamp":1605986926000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-018-00602-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,5]]},"references-count":27,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2019,9]]}},"alternative-id":["602"],"URL":"https:\/\/doi.org\/10.1007\/s10623-018-00602-9","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"type":"print","value":"0925-1022"},{"type":"electronic","value":"1573-7586"}],"subject":[],"published":{"date-parts":[[2019,1,5]]},"assertion":[{"value":"29 May 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 November 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 December 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 January 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}