Authentication theory/coding theory
Proceedings of CRYPTO 84 on Advances in cryptology
Elements of information theory
Elements of information theory
Information Theory: Coding Theorems for Discrete Memoryless Systems
Information Theory: Coding Theorems for Discrete Memoryless Systems
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
Secure transmission with multiple antennas I: the MISOME wiretap channel
IEEE Transactions on Information Theory
The NTMAC for authentication of noisy messages
IEEE Transactions on Information Forensics and Security
The CRC–NTMAC for Noisy Message Authentication
IEEE Transactions on Information Forensics and Security
Generalized privacy amplification
IEEE Transactions on Information Theory - Part 2
Common randomness in information theory and cryptography. II. CR capacity
IEEE Transactions on Information Theory
Authentication theory and hypothesis testing
IEEE Transactions on Information Theory
Multiple-Access Channels With Confidential Messages
IEEE Transactions on Information Theory
Wireless Information-Theoretic Security
IEEE Transactions on Information Theory
Introduction to the Special Issue on Information Theoretic Security
IEEE Transactions on Information Theory
Secure Communication Over Fading Channels
IEEE Transactions on Information Theory
The Relay–Eavesdropper Channel: Cooperation for Secrecy
IEEE Transactions on Information Theory
On the Secrecy Capacity of Fading Channels
IEEE Transactions on Information Theory
The Wiretap Channel With Feedback: Encryption Over the Channel
IEEE Transactions on Information Theory
The Secrecy Capacity of the MIMO Wiretap Channel
IEEE Transactions on Information Theory
Information Theoretic Security
Foundations and Trends in Communications and Information Theory
Wiretap channel type II with an active eavesdropper
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 3
Arbitrary jamming can preclude secure communication
Allerton'09 Proceedings of the 47th annual Allerton conference on Communication, control, and computing
EPSON: enhanced physical security in OFDM networks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Physical layer authentication over an OFDM fading wiretap channel
Proceedings of the 5th International ICST Conference on Performance Evaluation Methodologies and Tools
CMS'12 Proceedings of the 13th IFIP TC 6/TC 11 international conference on Communications and Multimedia Security
Wireless Personal Communications: An International Journal
Hi-index | 754.84 |
An authentication counterpart of Wyner's study of the wiretap channel is developed in this work. More specifically, message authentication over noisy channels is studied while impersonation and substitution attacks are investigated for both single-and multiple-message scenarios. For each scenario, information-theoretic lower and upper bounds on the opponent's success, or cheating, probability are derived. Remarkably, in both scenarios, the lower and upper bounds are shown to match, and hence, the fundamental limits on message authentication over noisy channels are fully characterized. The opponent's success probability is further shown to be smaller than that derived in the classical noiseless channel model. These results rely on a novel authentication scheme in which shared key information is used to provide simultaneous protection against both types of attacks. Finally, message authentication for the case in which the source and receiver possess only correlated sequences is studied.