TY - GEN
T1 - Authentication over noisy channels
AU - Lai, Lifeng
AU - El Gamal, Hesham
AU - Poor, H. Vincent
N1 - Copyright:
Copyright 2015 Elsevier B.V., All rights reserved.
PY - 2007
Y1 - 2007
N2 - In this work , message authentication over noisy channels Is studied. The model developed In this paper Is the authentication theory counterpart of Wyner's wiretap channel model. Two types of opponent attacks , namely Impersonation attacks and substitution attacks , are Investigated for both single message and multiple message authentication scenarios. For each scenario , Information theoretic lower and upper bounds on the opponent's success probability are derived. Remarkably , In both scenarios , lower and upper bounds are shown to match , and hence the fundamental limit of message authentication over noisy channels Is fully characterized. The opponent's success probability Is further shown to be smaller than that derived In the classic authentication model in which the channel is assumed to be noiseless. These results rely on a proposed novel authentication scheme in which key information is used to provide simultaneous protection again both types of attacks.
AB - In this work , message authentication over noisy channels Is studied. The model developed In this paper Is the authentication theory counterpart of Wyner's wiretap channel model. Two types of opponent attacks , namely Impersonation attacks and substitution attacks , are Investigated for both single message and multiple message authentication scenarios. For each scenario , Information theoretic lower and upper bounds on the opponent's success probability are derived. Remarkably , In both scenarios , lower and upper bounds are shown to match , and hence the fundamental limit of message authentication over noisy channels Is fully characterized. The opponent's success probability Is further shown to be smaller than that derived In the classic authentication model in which the channel is assumed to be noiseless. These results rely on a proposed novel authentication scheme in which key information is used to provide simultaneous protection again both types of attacks.
UR - http://www.scopus.com/inward/record.url?scp=84940671265&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84940671265&partnerID=8YFLogxK
M3 - Conference contribution
AN - SCOPUS:84940671265
T3 - 45th Annual Allerton Conference on Communication, Control, and Computing 2007
SP - 1030
EP - 1034
BT - 45th Annual Allerton Conference on Communication, Control, and Computing 2007
PB - University of Illinois at Urbana-Champaign, Coordinated Science Laboratory and Department of Computer and Electrical Engineering
T2 - 45th Annual Allerton Conference on Communication, Control, and Computing 2007
Y2 - 26 September 2007 through 28 September 2007
ER -