Keyless authentication in the presence of a simultaneously transmitting adversary

Eric Graves, Paul Yu, Predrag Spasojevic

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

Abstract

If Alice must communicate with Bob over a channel shared with the adversarial Eve, then Bob must be able to validate the authenticity of the message. In particular we consider the model where Alice and Eve share a discrete memoryless multiple access channel with Bob, thus allowing simultaneous transmissions from Alice and Eve. By traditional random coding arguments, we demonstrate an inner bound on the rate at which Alice may transmit, while still granting Bob the ability to authenticate. Furthermore this is accomplished in spite of Alice and Bob lacking a pre-shared key, as well as allowing Eve prior knowledge of both the codebook Alice and Bob share and the messages Alice transmits.

Original languageEnglish (US)
Title of host publication2016 IEEE Information Theory Workshop, ITW 2016
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages201-205
Number of pages5
ISBN (Electronic)9781509010905
DOIs
StatePublished - Oct 21 2016
Event2016 IEEE Information Theory Workshop, ITW 2016 - Cambridge, United Kingdom
Duration: Sep 11 2016Sep 14 2016

Publication series

Name2016 IEEE Information Theory Workshop, ITW 2016

Other

Other2016 IEEE Information Theory Workshop, ITW 2016
CountryUnited Kingdom
CityCambridge
Period9/11/169/14/16

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Information Systems
  • Software
  • Signal Processing

Fingerprint Dive into the research topics of 'Keyless authentication in the presence of a simultaneously transmitting adversary'. Together they form a unique fingerprint.

  • Cite this

    Graves, E., Yu, P., & Spasojevic, P. (2016). Keyless authentication in the presence of a simultaneously transmitting adversary. In 2016 IEEE Information Theory Workshop, ITW 2016 (pp. 201-205). [7606824] (2016 IEEE Information Theory Workshop, ITW 2016). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ITW.2016.7606824