We give three new authentication schemes without secrecy. The first two on finite fields and Galois rings, using Gray map for this link. The third construction is given on Galois rings. The main achievement in this work is to obtain optimal impersonation and substitution probabilities in the schemes. Additionally, in the first and second scheme, we simplify the source space and bring a better relationship between the size of the message space and the key space than the given in [8]. Finally, we provide a third scheme on Galois rings, which generalizes the scheme over finite fields constructed in [9].
Keywords:
Subject: Computer Science and Mathematics - Algebra and Number Theory
Copyright: This open access article is published under a Creative Commons CC BY 4.0 license, which permit the free download, distribution, and reuse, provided that the author and preprint are cited in any reuse.
Preprints.org is a free preprint server supported by MDPI in Basel, Switzerland.