Keyless authentication in the presence of a simultaneously transmitting adversary

Eric Graves, Paul Yu, Predrag Spasojevic

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Abstract

If Alice must communicate with Bob over a channel shared with the adversarial Eve, then Bob must be able to validate the authenticity of the message. In particular we consider the model where Alice and Eve share a discrete memoryless multiple access channel with Bob, thus allowing simultaneous transmissions from Alice and Eve. By traditional random coding arguments, we demonstrate an inner bound on the rate at which Alice may transmit, while still granting Bob the ability to authenticate. Furthermore this is accomplished in spite of Alice and Bob lacking a pre-shared key, as well as allowing Eve prior knowledge of both the codebook Alice and Bob share and the messages Alice transmits.

Original languageEnglish (US)
Title of host publication2016 IEEE Information Theory Workshop, ITW 2016
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages201-205
Number of pages5
ISBN (Electronic)9781509010905
DOIs
StatePublished - Oct 21 2016
Event2016 IEEE Information Theory Workshop, ITW 2016 - Cambridge, United Kingdom
Duration: Sep 11 2016Sep 14 2016

Publication series

Name2016 IEEE Information Theory Workshop, ITW 2016

Other

Other2016 IEEE Information Theory Workshop, ITW 2016
CountryUnited Kingdom
CityCambridge
Period9/11/169/14/16

Fingerprint

Authentication

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Information Systems
  • Software
  • Signal Processing

Cite this

Graves, E., Yu, P., & Spasojevic, P. (2016). Keyless authentication in the presence of a simultaneously transmitting adversary. In 2016 IEEE Information Theory Workshop, ITW 2016 (pp. 201-205). [7606824] (2016 IEEE Information Theory Workshop, ITW 2016). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ITW.2016.7606824
Graves, Eric ; Yu, Paul ; Spasojevic, Predrag. / Keyless authentication in the presence of a simultaneously transmitting adversary. 2016 IEEE Information Theory Workshop, ITW 2016. Institute of Electrical and Electronics Engineers Inc., 2016. pp. 201-205 (2016 IEEE Information Theory Workshop, ITW 2016).
@inproceedings{d12b9c4c29244521b0a6227931aa907c,
title = "Keyless authentication in the presence of a simultaneously transmitting adversary",
abstract = "If Alice must communicate with Bob over a channel shared with the adversarial Eve, then Bob must be able to validate the authenticity of the message. In particular we consider the model where Alice and Eve share a discrete memoryless multiple access channel with Bob, thus allowing simultaneous transmissions from Alice and Eve. By traditional random coding arguments, we demonstrate an inner bound on the rate at which Alice may transmit, while still granting Bob the ability to authenticate. Furthermore this is accomplished in spite of Alice and Bob lacking a pre-shared key, as well as allowing Eve prior knowledge of both the codebook Alice and Bob share and the messages Alice transmits.",
author = "Eric Graves and Paul Yu and Predrag Spasojevic",
year = "2016",
month = "10",
day = "21",
doi = "10.1109/ITW.2016.7606824",
language = "English (US)",
series = "2016 IEEE Information Theory Workshop, ITW 2016",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
pages = "201--205",
booktitle = "2016 IEEE Information Theory Workshop, ITW 2016",
address = "United States",

}

Graves, E, Yu, P & Spasojevic, P 2016, Keyless authentication in the presence of a simultaneously transmitting adversary. in 2016 IEEE Information Theory Workshop, ITW 2016., 7606824, 2016 IEEE Information Theory Workshop, ITW 2016, Institute of Electrical and Electronics Engineers Inc., pp. 201-205, 2016 IEEE Information Theory Workshop, ITW 2016, Cambridge, United Kingdom, 9/11/16. https://doi.org/10.1109/ITW.2016.7606824

Keyless authentication in the presence of a simultaneously transmitting adversary. / Graves, Eric; Yu, Paul; Spasojevic, Predrag.

2016 IEEE Information Theory Workshop, ITW 2016. Institute of Electrical and Electronics Engineers Inc., 2016. p. 201-205 7606824 (2016 IEEE Information Theory Workshop, ITW 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - Keyless authentication in the presence of a simultaneously transmitting adversary

AU - Graves, Eric

AU - Yu, Paul

AU - Spasojevic, Predrag

PY - 2016/10/21

Y1 - 2016/10/21

N2 - If Alice must communicate with Bob over a channel shared with the adversarial Eve, then Bob must be able to validate the authenticity of the message. In particular we consider the model where Alice and Eve share a discrete memoryless multiple access channel with Bob, thus allowing simultaneous transmissions from Alice and Eve. By traditional random coding arguments, we demonstrate an inner bound on the rate at which Alice may transmit, while still granting Bob the ability to authenticate. Furthermore this is accomplished in spite of Alice and Bob lacking a pre-shared key, as well as allowing Eve prior knowledge of both the codebook Alice and Bob share and the messages Alice transmits.

AB - If Alice must communicate with Bob over a channel shared with the adversarial Eve, then Bob must be able to validate the authenticity of the message. In particular we consider the model where Alice and Eve share a discrete memoryless multiple access channel with Bob, thus allowing simultaneous transmissions from Alice and Eve. By traditional random coding arguments, we demonstrate an inner bound on the rate at which Alice may transmit, while still granting Bob the ability to authenticate. Furthermore this is accomplished in spite of Alice and Bob lacking a pre-shared key, as well as allowing Eve prior knowledge of both the codebook Alice and Bob share and the messages Alice transmits.

UR - http://www.scopus.com/inward/record.url?scp=84998673874&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84998673874&partnerID=8YFLogxK

U2 - 10.1109/ITW.2016.7606824

DO - 10.1109/ITW.2016.7606824

M3 - Conference contribution

AN - SCOPUS:84998673874

T3 - 2016 IEEE Information Theory Workshop, ITW 2016

SP - 201

EP - 205

BT - 2016 IEEE Information Theory Workshop, ITW 2016

PB - Institute of Electrical and Electronics Engineers Inc.

ER -

Graves E, Yu P, Spasojevic P. Keyless authentication in the presence of a simultaneously transmitting adversary. In 2016 IEEE Information Theory Workshop, ITW 2016. Institute of Electrical and Electronics Engineers Inc. 2016. p. 201-205. 7606824. (2016 IEEE Information Theory Workshop, ITW 2016). https://doi.org/10.1109/ITW.2016.7606824