Primitives And Schemes For Non-Atomic Information Authentication