Authentication over Noisy Channels

Preprint English OPEN
Lai, Lifeng; Gamal, Hesham El; Poor, H. Vincent;
(2008)
  • Subject: Computer Science - Information Theory | Computer Science - Cryptography and Security
    arxiv: Computer Science::Information Theory | Computer Science::Cryptography and Security | Computer Science::Multimedia

In this work, message authentication over noisy channels is studied. The model developed in this paper is the authentication theory counterpart of Wyner's wiretap channel model. Two types of opponent attacks, namely impersonation attacks and substitution attacks, are in... View more
  • References (13)
    13 references, page 1 of 2

    [1] C. E. Shannon, “Communication theory of secrecy systems,” Bell System Technical Journal, vol. 28, pp. 656-715, Oct. 1949.

    [2] A. D. Wyner, “The wire-tap channel,” Bell System Technical Journal, vol. 54, no. 8, pp. 1355-1387, 1975.

    [3] I. Csisza´r and J. Ko¨rner, “Broadcast channels with confidential messages,” IEEE Transactions on Information Theory, vol. 24, pp. 339-348, May 1978.

    [4] G. J. Simmons, “Authentication theory/coding theory,” in Proceedings of CRYPTO 84 on Advances in Cryptology, (New York, NY, USA), pp. 411-431, Springer-Verlag Inc., 1985.

    [5] U. M. Maurer, “Authentication theory and hypothesis testing,” IEEE Trans. on Information Theory, vol. 46, pp. 1350-1356, Jul. 2000.

    [6] Y. Liu and C. G. Boncelet, “The CRC-NTMAC for noisy message authentication,” IEEE Transactions on Information Forensics and Security, vol. 1, pp. 517-523, Dec. 2006.

    [7] C. G. Boncelet, “The NTMAC for authentication of noisy messages,” IEEE Transactions on Information Forensics and Security, vol. 1, pp. 35-42, Mar. 2006.

    [8] C. H. Bennett, G. Brassard, C. Crepeau, and U. M. Maurer, “Generalized privacy amplification,” IEEE Transactions on Information Theory, vol. 41, pp. 1915-1923, Nov. 1995.

    [9] U. M. Maurer and S. Wolf, “Information-theoretic key agreement: From weak to strong secrecy for free,” Lecture Notes in Computer Science, vol. 1807, pp. 356-373, 2000.

    [10] I. Csisza´r, “Almost independence and secrecy capacity,” Problems of Information Transmission, vol. 32, pp. 40-47, Jan. 1996.

  • Metrics
Share - Bookmark