全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...
-  2015 

窃听信道下的认证信道容量
Authentication Capacity Over Wiretap Channel

DOI: 10.3969/j.issn.1001-0548.2015.04.017

Keywords: 消息认证,认证信道容量,信息论安全,窃听信道

Full-Text   Cite this paper   Add to My Lib

Abstract:

消息认证是合法发送方Alice传输消息M给合法的接收方Bob并向Bob认证M的交互过程。为了防止敌手Eve的攻击,Alice和Bob通常共享了一个安全密钥。该文考察如下认证框架:Alice首先通过无噪声信道将消息M发送给Bob;Alice接着利用消息M和安全密钥K生成一个认证标签;Alice再将认证标签转化为码字Xn;最后,Alice通过窃听信道模型将码字Xn传输给Bob。该文定义了固定标签率下的安全认证信道容量,并证明该认证信道容量等于H(X|Z)。特别地,证明了文献[15]提出的协议在该文的认证模型中是可达容量的。

References

[1]  BARACCA P, LAURENTI N, TOMASIN S. Physical layer authentication over MIMO fading wiretap channels[J]. IEEE Transactions on Wireless Communications, 2012, 11(7): 2564-2573.
[2]  MAURER U M. Authentication theory and hypothesis testing[J]. IEEE Trans Inf Theory, 2000, 46(4): 1350-1356.
[3]  WYNER A D. The wire-tap channel[J]. Bell Syst Tech J, 1975, 54: 1355-1387.
[4]  CSISZAR I, KORNER J. Broadcast channels with confidential messages[J]. IEEE Trans Inf Theory, 1978, 24(3): 339-348.
[5]  MAURER U M, WOLF S. Secret-key agreement over unauthenticated public channels, part I: Definitions and a completeness result[J]. IEEE Trans Inf Theory, 2003, 49(4): 822-831.
[6]  MAURER U M, WOLF S. Secret-key agreement over unauthenticated public channels, part II: the simulatability condition[J]. IEEE Trans Inf Theory, 2003, 49(4): 832-838.
[7]  MAURER U M, WOLF S. Secret-key agreement over unauthenticated public channels, part III: Privacy amplification[J]. IEEE Trans Inf Theory, 2003, 49(4): 839-851.
[8]  CHEN D J, QIN Z, MAO X F, et al. Smokegrenade: an efficient key generation protocol with artificial interference
[9]  [J]. IEEE Transactions on Information Forensics & Security, 2013, 8(11): 1731-1745.
[10]  CHEN D J, MAO X F, QIN Z, et al. Smokegrenade: a key generation protocol with artificial interference in wireless networks[C]//Proceedings of IEEE MASS. Hangzhou: IEEE, 2013: 200-208.
[11]  KORZHIK V, YAKOVLEV V, MORALES L G, et al. Performance evaluation of keyless authentication based on noisy channel[C]//MMM-ACNS 2007. Berlin, Heidelberg: Springer-Verlag, 2007: 115-126.
[12]  AHLSWEDE R, CSISZAR I. Common randomness in information theory and cryptography, part II: CR capacity [J]. IEEE Trans Inf Theory, 1998, 44(1): 225-240.
[13]  LAI L F, ELGAMAL H, POOR H V. Authentication over noisy channels[J]. IEEE Trans Inf Theory, 2009, 55(2): 906-916.
[14]  FERRANTE A, LAURENTI N, MASIERO C, et al. On the achievable error region of physical layer authentication techniques over Rayleigh fading channels[EB/OL]. (2013-03-04). http://arxiv.org/abs/1303.0707.
[15]  CHEN D J, JIANG S Q, QIN Z G. Message authentication code over a wiretap channel[EB/OL]. (2013-10-15). http://arxiv.org/abs/1310.3902.
[16]  SIMMONS G J. Authentication theory/coding theory[C]// Proc of CRYPTO'84. Berlin, Heidelberg: Springer, 1985: 411-431.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133