Next Article in Journal
Broad Niche Overlap between Invasive Nile Tilapia Oreochromis niloticus and Indigenous Congenerics in Southern Africa: Should We be Concerned?
Next Article in Special Issue
An Intelligent and Fast Chaotic Encryption Using Digital Logic Circuits for Ad-Hoc and Ubiquitous Computing
Previous Article in Journal
Fisher Information Properties
Previous Article in Special Issue
Personal Information Leaks with Automatic Login in Mobile Social Network Services
Open AccessArticle

Identity Authentication over Noisy Channels

1
Department of Communication Engineering, Xiamen University, Xiamen 361005, China
2
Department of Electronic Engineering, Tsinghua University, Beijing 100084, China
3
Research Institute of Information Technology, Tsinghua University, Beijing 100084, China
4
State Key Laboratory on Microwave and Digital Communications, Tsinghua University, Beijing 100084, China
5
Tsinghua National Laboratory for Information Science and Technology, Tsinghua University, Beijing 100084, China
*
Author to whom correspondence should be addressed.
Academic Editors: James Park and Wanlei Zhou
Entropy 2015, 17(7), 4940-4958; https://doi.org/10.3390/e17074940
Received: 7 April 2015 / Revised: 14 June 2015 / Accepted: 9 July 2015 / Published: 14 July 2015
Identity authentication is the process of verifying users’ validity. Unlike classical key-based authentications, which are built on noiseless channels, this paper introduces a general analysis and design framework for identity authentication over noisy channels. Specifically, the authentication scenarios of single time and multiple times are investigated. For each scenario, the lower bound on the opponent’s success probability is derived, and it is smaller than the classical identity authentication’s. In addition, it can remain the same, even if the secret key is reused. Remarkably, the Cartesian authentication code proves to be helpful for hiding the secret key to maximize the secrecy performance. Finally, we show a potential application of this authentication technique. View Full-Text
Keywords: identification; authentication; information theoretic security; physical-layer security; wiretap channel identification; authentication; information theoretic security; physical-layer security; wiretap channel
MDPI and ACS Style

Zheng, F.; Xiao, Z.; Zhou, S.; Wang, J.; Huang, L. Identity Authentication over Noisy Channels. Entropy 2015, 17, 4940-4958.

Show more citation formats Show less citations formats

Article Access Map by Country/Region

1
Only visits after 24 November 2015 are recorded.
Back to TopTop