Volume 44 Issue 4
Aug.  2015
Article Contents

CHEN Da-jiang, QIN Zhen, QIN Zhi-guang. Authentication Capacity Over Wiretap Channel[J]. Journal of University of Electronic Science and Technology of China, 2015, 44(4): 579-583. doi: 10.3969/j.issn.1001-0548.2015.04.017
Citation: CHEN Da-jiang, QIN Zhen, QIN Zhi-guang. Authentication Capacity Over Wiretap Channel[J]. Journal of University of Electronic Science and Technology of China, 2015, 44(4): 579-583. doi: 10.3969/j.issn.1001-0548.2015.04.017

Authentication Capacity Over Wiretap Channel

doi: 10.3969/j.issn.1001-0548.2015.04.017
  • Publish Date: 2015-08-15
  • [J]. IEEE Transactions on Information Forensics & Security, 2013, 8(11): 1731-1745.
    [2] SIMMONS G J. Authentication theory/coding theory[C]// Proc of CRYPTO'84. Berlin, Heidelberg: Springer, 1985: 411-431.
    [3] MAURER U M. Authentication theory and hypothesis testing[J]. IEEE Trans Inf Theory, 2000, 46(4): 1350-1356.
    [4] WYNER A D. The wire-tap channel[J]. Bell Syst Tech J, 1975, 54: 1355-1387.
    [5] CSISZAR I, KORNER J. Broadcast channels with confidential messages[J]. IEEE Trans Inf Theory, 1978, 24(3): 339-348.
    [6] MAURER U M, WOLF S. Secret-key agreement over unauthenticated public channels, part I: Definitions and a completeness result[J]. IEEE Trans Inf Theory, 2003, 49(4): 822-831.
    [7] MAURER U M, WOLF S. Secret-key agreement over unauthenticated public channels, part II: the simulatability condition[J]. IEEE Trans Inf Theory, 2003, 49(4): 832-838.
    [8] MAURER U M, WOLF S. Secret-key agreement over unauthenticated public channels, part III: Privacy amplification[J]. IEEE Trans Inf Theory, 2003, 49(4): 839-851.
    [9] CHEN D J, QIN Z, MAO X F, et al. Smokegrenade: an efficient key generation protocol with artificial interference
    [10] CHEN D J, MAO X F, QIN Z, et al. Smokegrenade: a key generation protocol with artificial interference in wireless networks[C]//Proceedings of IEEE MASS. Hangzhou: IEEE, 2013: 200-208.
    [11] KORZHIK V, YAKOVLEV V, MORALES L G, et al. Performance evaluation of keyless authentication based on noisy channel[C]//MMM-ACNS 2007. Berlin, Heidelberg: Springer-Verlag, 2007: 115-126.
    [12] AHLSWEDE R, CSISZAR I. Common randomness in information theory and cryptography, part II: CR capacity [J]. IEEE Trans Inf Theory, 1998, 44(1): 225-240.
    [13] LAI L F, ELGAMAL H, POOR H V. Authentication over noisy channels[J]. IEEE Trans Inf Theory, 2009, 55(2): 906-916.
    [14] BARACCA P, LAURENTI N, TOMASIN S. Physical layer authentication over MIMO fading wiretap channels[J]. IEEE Transactions on Wireless Communications, 2012, 11(7): 2564-2573.
  • 加载中
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Article Metrics

Article views(4595) PDF downloads(152) Cited by()

Related
Proportional views

Authentication Capacity Over Wiretap Channel

doi: 10.3969/j.issn.1001-0548.2015.04.017
CHEN Da-jiang, QIN Zhen, QIN Zhi-guang. Authentication Capacity Over Wiretap Channel[J]. Journal of University of Electronic Science and Technology of China, 2015, 44(4): 579-583. doi: 10.3969/j.issn.1001-0548.2015.04.017
Citation: CHEN Da-jiang, QIN Zhen, QIN Zhi-guang. Authentication Capacity Over Wiretap Channel[J]. Journal of University of Electronic Science and Technology of China, 2015, 44(4): 579-583. doi: 10.3969/j.issn.1001-0548.2015.04.017
Reference (14)

Catalog

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return