Show simple item record

dc.contributor.authorChou, Remi
dc.contributor.authorYener, Aylin
dc.date.accessioned2020-01-19T19:48:14Z
dc.date.available2020-01-19T19:48:14Z
dc.date.issued2019-10-08
dc.identifier.citationR. A. Chou and A. Yener, "Strongly Secure Multiuser Communication and Authentication With Anonymity Constraints," in IEEE Transactions on Information Theory, vol. 66, no. 1, pp. 572-586, Jan. 2020en_US
dc.identifier.issn0018-9448
dc.identifier.urihttps://doi.org/10.1109/TIT.2019.2946252
dc.identifier.urihttp://hdl.handle.net/10057/17006
dc.descriptionClick on the DOI link to access the article (may not be free).en_US
dc.description.abstractWe consider authentication of messages sent from transmitters to a receiver over a multiple access channel, where each transmitter shares a secret key with the legitimate receiver. Additionally, there exists a computationally unbounded opponent who has access to noisy observations of the messages transmitted and can initiate impersonation or substitution attacks. We require that the legitimate receiver must be able to authenticate the messages he receives with respect to predetermined groups of transmitters, but at the same time must be kept ignorant of the transmitter's identity of a given message in a given group. We propose an information-theoretic formulation of these anonymity constraints as well as an authentication coding scheme for which the asymptotic probability of successful attack is shown to optimally scale with the length of the secret keys shared between each transmitter and the legitimate receiver. Our results quantify the positive impact of the multiple access setting compared to the single-user setting on the probability of successful attack.en_US
dc.description.sponsorshipNSF under Grant CIF-1319338 and Grant CNS-1314719.en_US
dc.language.isoen_USen_US
dc.publisherIEEEen_US
dc.relation.ispartofseriesIEEE Transactions on Information Theory;v.66:no.1
dc.subjectAnonymityen_US
dc.subjectAuthenticationen_US
dc.subjectImpersonation attacken_US
dc.subjectMultiple access wiretap channelen_US
dc.subjectSubstitution attacken_US
dc.titleStrongly secure multiuser communication and authentication with anonymity constraintsen_US
dc.typeConference paperen_US
dc.rights.holder© 1963-2012 IEEEen_US


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record