|
- 2015
窃听信道下的认证信道容量
|
Abstract:
消息认证是合法发送方Alice传输消息M给合法的接收方Bob并向Bob认证M的交互过程。为了防止敌手Eve的攻击,Alice和Bob通常共享了一个安全密钥。该文考察如下认证框架:Alice首先通过无噪声信道将消息M发送给Bob;Alice接着利用消息M和安全密钥K生成一个认证标签;Alice再将认证标签转化为码字Xn;最后,Alice通过窃听信道模型将码字Xn传输给Bob。该文定义了固定标签率下的安全认证信道容量,并证明该认证信道容量等于H(X|Z)。特别地,证明了文献[15]提出的协议在该文的认证模型中是可达容量的。
[1] | BARACCA P, LAURENTI N, TOMASIN S. Physical layer authentication over MIMO fading wiretap channels[J]. IEEE Transactions on Wireless Communications, 2012, 11(7): 2564-2573. |
[2] | MAURER U M. Authentication theory and hypothesis testing[J]. IEEE Trans Inf Theory, 2000, 46(4): 1350-1356. |
[3] | WYNER A D. The wire-tap channel[J]. Bell Syst Tech J, 1975, 54: 1355-1387. |
[4] | CSISZAR I, KORNER J. Broadcast channels with confidential messages[J]. IEEE Trans Inf Theory, 1978, 24(3): 339-348. |
[5] | MAURER U M, WOLF S. Secret-key agreement over unauthenticated public channels, part I: Definitions and a completeness result[J]. IEEE Trans Inf Theory, 2003, 49(4): 822-831. |
[6] | MAURER U M, WOLF S. Secret-key agreement over unauthenticated public channels, part II: the simulatability condition[J]. IEEE Trans Inf Theory, 2003, 49(4): 832-838. |
[7] | MAURER U M, WOLF S. Secret-key agreement over unauthenticated public channels, part III: Privacy amplification[J]. IEEE Trans Inf Theory, 2003, 49(4): 839-851. |
[8] | CHEN D J, QIN Z, MAO X F, et al. Smokegrenade: an efficient key generation protocol with artificial interference |
[9] | [J]. IEEE Transactions on Information Forensics & Security, 2013, 8(11): 1731-1745. |
[10] | CHEN D J, MAO X F, QIN Z, et al. Smokegrenade: a key generation protocol with artificial interference in wireless networks[C]//Proceedings of IEEE MASS. Hangzhou: IEEE, 2013: 200-208. |
[11] | KORZHIK V, YAKOVLEV V, MORALES L G, et al. Performance evaluation of keyless authentication based on noisy channel[C]//MMM-ACNS 2007. Berlin, Heidelberg: Springer-Verlag, 2007: 115-126. |
[12] | AHLSWEDE R, CSISZAR I. Common randomness in information theory and cryptography, part II: CR capacity [J]. IEEE Trans Inf Theory, 1998, 44(1): 225-240. |
[13] | LAI L F, ELGAMAL H, POOR H V. Authentication over noisy channels[J]. IEEE Trans Inf Theory, 2009, 55(2): 906-916. |
[14] | FERRANTE A, LAURENTI N, MASIERO C, et al. On the achievable error region of physical layer authentication techniques over Rayleigh fading channels[EB/OL]. (2013-03-04). http://arxiv.org/abs/1303.0707. |
[15] | CHEN D J, JIANG S Q, QIN Z G. Message authentication code over a wiretap channel[EB/OL]. (2013-10-15). http://arxiv.org/abs/1310.3902. |
[16] | SIMMONS G J. Authentication theory/coding theory[C]// Proc of CRYPTO'84. Berlin, Heidelberg: Springer, 1985: 411-431. |