Next Article in Journal
Broad Niche Overlap between Invasive Nile Tilapia Oreochromis niloticus and Indigenous Congenerics in Southern Africa: Should We be Concerned?
Next Article in Special Issue
An Intelligent and Fast Chaotic Encryption Using Digital Logic Circuits for Ad-Hoc and Ubiquitous Computing
Previous Article in Journal
Fisher Information Properties
Previous Article in Special Issue
Personal Information Leaks with Automatic Login in Mobile Social Network Services
Article Menu

Export Article

Open AccessArticle
Entropy 2015, 17(7), 4940-4958; doi:10.3390/e17074940

Identity Authentication over Noisy Channels

1
Department of Communication Engineering, Xiamen University, Xiamen 361005, China
2
Department of Electronic Engineering, Tsinghua University, Beijing 100084, China
3
Research Institute of Information Technology, Tsinghua University, Beijing 100084, China
4
State Key Laboratory on Microwave and Digital Communications, Tsinghua University, Beijing 100084, China
5
Tsinghua National Laboratory for Information Science and Technology, Tsinghua University, Beijing 100084, China
*
Author to whom correspondence should be addressed.
Academic Editors: James Park and Wanlei Zhou
Received: 7 April 2015 / Revised: 14 June 2015 / Accepted: 9 July 2015 / Published: 14 July 2015
View Full-Text   |   Download PDF [2084 KB, uploaded 14 July 2015]   |  

Abstract

Identity authentication is the process of verifying users’ validity. Unlike classical key-based authentications, which are built on noiseless channels, this paper introduces a general analysis and design framework for identity authentication over noisy channels. Specifically, the authentication scenarios of single time and multiple times are investigated. For each scenario, the lower bound on the opponent’s success probability is derived, and it is smaller than the classical identity authentication’s. In addition, it can remain the same, even if the secret key is reused. Remarkably, the Cartesian authentication code proves to be helpful for hiding the secret key to maximize the secrecy performance. Finally, we show a potential application of this authentication technique. View Full-Text
Keywords: identification; authentication; information theoretic security; physical-layer security; wiretap channel identification; authentication; information theoretic security; physical-layer security; wiretap channel
This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. (CC BY 4.0).

Scifeed alert for new publications

Never miss any articles matching your research from any publisher
  • Get alerts for new papers matching your research
  • Find out the new papers from selected authors
  • Updated daily for 49'000+ journals and 6000+ publishers
  • Define your Scifeed now

SciFeed Share & Cite This Article

MDPI and ACS Style

Zheng, F.; Xiao, Z.; Zhou, S.; Wang, J.; Huang, L. Identity Authentication over Noisy Channels. Entropy 2015, 17, 4940-4958.

Show more citation formats Show less citations formats

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Entropy EISSN 1099-4300 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top