### Abstract

If Alice must communicate with Bob over a channel shared with the adversarial Eve, then Bob must be able to validate the authenticity of the message. In particular we consider the model where Alice and Eve share a discrete memoryless multiple access channel with Bob, thus allowing simultaneous transmissions from Alice and Eve. By traditional random coding arguments, we demonstrate an inner bound on the rate at which Alice may transmit, while still granting Bob the ability to authenticate. Furthermore this is accomplished in spite of Alice and Bob lacking a pre-shared key, as well as allowing Eve prior knowledge of both the codebook Alice and Bob share and the messages Alice transmits.

Original language | English (US) |
---|---|

Title of host publication | 2016 IEEE Information Theory Workshop, ITW 2016 |

Publisher | Institute of Electrical and Electronics Engineers Inc. |

Pages | 201-205 |

Number of pages | 5 |

ISBN (Electronic) | 9781509010905 |

DOIs | |

State | Published - Oct 21 2016 |

Event | 2016 IEEE Information Theory Workshop, ITW 2016 - Cambridge, United Kingdom Duration: Sep 11 2016 → Sep 14 2016 |

### Publication series

Name | 2016 IEEE Information Theory Workshop, ITW 2016 |
---|

### Other

Other | 2016 IEEE Information Theory Workshop, ITW 2016 |
---|---|

Country | United Kingdom |

City | Cambridge |

Period | 9/11/16 → 9/14/16 |

### Fingerprint

### All Science Journal Classification (ASJC) codes

- Computer Networks and Communications
- Information Systems
- Software
- Signal Processing

### Cite this

*2016 IEEE Information Theory Workshop, ITW 2016*(pp. 201-205). [7606824] (2016 IEEE Information Theory Workshop, ITW 2016). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ITW.2016.7606824

}

*2016 IEEE Information Theory Workshop, ITW 2016.*, 7606824, 2016 IEEE Information Theory Workshop, ITW 2016, Institute of Electrical and Electronics Engineers Inc., pp. 201-205, 2016 IEEE Information Theory Workshop, ITW 2016, Cambridge, United Kingdom, 9/11/16. https://doi.org/10.1109/ITW.2016.7606824

**Keyless authentication in the presence of a simultaneously transmitting adversary.** / Graves, Eric; Yu, Paul; Spasojevic, Predrag.

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

TY - GEN

T1 - Keyless authentication in the presence of a simultaneously transmitting adversary

AU - Graves, Eric

AU - Yu, Paul

AU - Spasojevic, Predrag

PY - 2016/10/21

Y1 - 2016/10/21

N2 - If Alice must communicate with Bob over a channel shared with the adversarial Eve, then Bob must be able to validate the authenticity of the message. In particular we consider the model where Alice and Eve share a discrete memoryless multiple access channel with Bob, thus allowing simultaneous transmissions from Alice and Eve. By traditional random coding arguments, we demonstrate an inner bound on the rate at which Alice may transmit, while still granting Bob the ability to authenticate. Furthermore this is accomplished in spite of Alice and Bob lacking a pre-shared key, as well as allowing Eve prior knowledge of both the codebook Alice and Bob share and the messages Alice transmits.

AB - If Alice must communicate with Bob over a channel shared with the adversarial Eve, then Bob must be able to validate the authenticity of the message. In particular we consider the model where Alice and Eve share a discrete memoryless multiple access channel with Bob, thus allowing simultaneous transmissions from Alice and Eve. By traditional random coding arguments, we demonstrate an inner bound on the rate at which Alice may transmit, while still granting Bob the ability to authenticate. Furthermore this is accomplished in spite of Alice and Bob lacking a pre-shared key, as well as allowing Eve prior knowledge of both the codebook Alice and Bob share and the messages Alice transmits.

UR - http://www.scopus.com/inward/record.url?scp=84998673874&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84998673874&partnerID=8YFLogxK

U2 - 10.1109/ITW.2016.7606824

DO - 10.1109/ITW.2016.7606824

M3 - Conference contribution

AN - SCOPUS:84998673874

T3 - 2016 IEEE Information Theory Workshop, ITW 2016

SP - 201

EP - 205

BT - 2016 IEEE Information Theory Workshop, ITW 2016

PB - Institute of Electrical and Electronics Engineers Inc.

ER -