Authentication Capacity Over Wiretap Channel
-
摘要: 消息认证是合法发送方Alice传输消息M给合法的接收方Bob并向Bob认证M的交互过程。为了防止敌手Eve的攻击,Alice和Bob通常共享了一个安全密钥。该文考察如下认证框架:Alice首先通过无噪声信道将消息M发送给Bob;Alice接着利用消息M和安全密钥K生成一个认证标签;Alice再将认证标签转化为码字Xn;最后,Alice通过窃听信道模型将码字Xn传输给Bob。该文定义了固定标签率下的安全认证信道容量,并证明该认证信道容量等于H(X|Z)。特别地,证明了文献[15]提出的协议在该文的认证模型中是可达容量的。
-
[J]. IEEE Transactions on Information Forensics & Security, 2013, 8(11): 1731-1745. [2] SIMMONS G J. Authentication theory/coding theory[C]// Proc of CRYPTO'84. Berlin, Heidelberg: Springer, 1985: 411-431. [3] MAURER U M. Authentication theory and hypothesis testing[J]. IEEE Trans Inf Theory, 2000, 46(4): 1350-1356. [4] WYNER A D. The wire-tap channel[J]. Bell Syst Tech J, 1975, 54: 1355-1387. [5] CSISZAR I, KORNER J. Broadcast channels with confidential messages[J]. IEEE Trans Inf Theory, 1978, 24(3): 339-348. [6] MAURER U M, WOLF S. Secret-key agreement over unauthenticated public channels, part I: Definitions and a completeness result[J]. IEEE Trans Inf Theory, 2003, 49(4): 822-831. [7] MAURER U M, WOLF S. Secret-key agreement over unauthenticated public channels, part II: the simulatability condition[J]. IEEE Trans Inf Theory, 2003, 49(4): 832-838. [8] MAURER U M, WOLF S. Secret-key agreement over unauthenticated public channels, part III: Privacy amplification[J]. IEEE Trans Inf Theory, 2003, 49(4): 839-851. [9] CHEN D J, QIN Z, MAO X F, et al. Smokegrenade: an efficient key generation protocol with artificial interference [10] CHEN D J, MAO X F, QIN Z, et al. Smokegrenade: a key generation protocol with artificial interference in wireless networks[C]//Proceedings of IEEE MASS. Hangzhou: IEEE, 2013: 200-208. [11] KORZHIK V, YAKOVLEV V, MORALES L G, et al. Performance evaluation of keyless authentication based on noisy channel[C]//MMM-ACNS 2007. Berlin, Heidelberg: Springer-Verlag, 2007: 115-126. [12] AHLSWEDE R, CSISZAR I. Common randomness in information theory and cryptography, part II: CR capacity [J]. IEEE Trans Inf Theory, 1998, 44(1): 225-240. [13] LAI L F, ELGAMAL H, POOR H V. Authentication over noisy channels[J]. IEEE Trans Inf Theory, 2009, 55(2): 906-916. [14] BARACCA P, LAURENTI N, TOMASIN S. Physical layer authentication over MIMO fading wiretap channels[J]. IEEE Transactions on Wireless Communications, 2012, 11(7): 2564-2573.
点击查看大图
计量
- 文章访问数: 5403
- HTML全文浏览量: 186
- PDF下载量: 152
- 被引次数: 0