Message Authentication over Noisy Channels
AbstractThe essence of authentication is the transmission of unique and irreproducible information. In this paper, the authentication becomes a problem of the secure transmission of the secret key over noisy channels. A general analysis and design framework for message authentication is presented based on the results of Wyner’s wiretap channel. Impersonation and substitution attacks are primarily investigated. Information-theoretic lower and upper bounds on the opponent’s success probability are derived, and the lower bound and the upper bound are shown to match. In general, the fundamental limits on message authentication over noisy channels are fully characterized. Analysis results demonstrate that introducing noisy channels is a reliable way to enhance the security of authentication. View Full-Text
Scifeed alert for new publicationsNever miss any articles matching your research from any publisher
- Get alerts for new papers matching your research
- Find out the new papers from selected authors
- Updated daily for 49'000+ journals and 6000+ publishers
- Define your Scifeed now
Zheng, F.; Xiao, Z.; Zhou, S.; Wang, J.; Huang, L. Message Authentication over Noisy Channels. Entropy 2015, 17, 368-383.
Zheng F, Xiao Z, Zhou S, Wang J, Huang L. Message Authentication over Noisy Channels. Entropy. 2015; 17(1):368-383.Chicago/Turabian Style
Zheng, Fanfan; Xiao, Zhiqing; Zhou, Shidong; Wang, Jing; Huang, Lianfen. 2015. "Message Authentication over Noisy Channels." Entropy 17, no. 1: 368-383.