Keyless authentication in a noisy model

S Jiang - IEEE transactions on information forensics and …, 2014 - ieeexplore.ieee.org
IEEE transactions on information forensics and security, 2014ieeexplore.ieee.org
We study a keyless authentication problem in a new noisy model, where there is a discrete
memoryless channel (DMC) W 1 from sender Alice to receiver Bob and a DMC W 2 from
adversary Oscar to Bob. In addition, there is an insecure noiseless channel between Alice
and Bob. Under this model, we characterize the condition under which an authentication
from Alice to Bob is possible. We also construct a secure authentication protocol that has an
authentication rate approaching infinity. Finally, we prove that the authentication capacity of …
We study a keyless authentication problem in a new noisy model, where there is a discrete memoryless channel (DMC) W 1 from sender Alice to receiver Bob and a DMC W 2 from adversary Oscar to Bob. In addition, there is an insecure noiseless channel between Alice and Bob. Under this model, we characterize the condition under which an authentication from Alice to Bob is possible. We also construct a secure authentication protocol that has an authentication rate approaching infinity. Finally, we prove that the authentication capacity of a noninteractive authentication over binary symmetric channels is exactly 1. This is an interesting result as Shannon capacity of channel W 1 is strictly less than 1 while the noiseless channel is completely unreliable.
ieeexplore.ieee.org
Showing the best result for this search. See all results