Authentication Against a Myopic Adversary

01/10/2020
by   Allison Beemer, et al.
0

We consider keyless authentication for point-to-point communication in the presence of a myopic adversary. In particular, the adversary has access to a non-causal noisy version of the transmission and may use this knowledge to choose the channel state of an arbitrarily-varying channel between legitimate users; the receiver is successful if it either decodes to the correct message or correctly detects adversarial interference. We show that a channel condition called U-overwritability, which allows the adversary to make its false message appear legitimate and untampered with, is a sufficient condition for zero authentication capacity. We present a useful way to compare adversarial channels, and show that once an AVC becomes U-overwritable, it remains U-overwritable for all "less myopic" adversaries. Finally, we show that stochastic encoders are necessary for positive authentication capacity in some cases, and examine in detail a binary adversarial channel that illustrates this necessity. Namely, for this binary channel, we show that when the adversarial channel is degraded with respect to the main channel between users, the no-adversary capacity of the underlying channel is achievable with a deterministic encoder. Otherwise, provided the channel to the adversary is not perfect, a stochastic encoder is necessary for positive authentication capacity; if such an encoder is allowed, the no-adversary capacity is again achievable.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/12/2023

On Authentication against a Myopic Adversary using Stochastic Codes

We consider the problem of authenticated communication over a discrete a...
research
11/11/2021

Keyless Authentication for AWGN Channels

This work establishes that the physical layer can be used to perform inf...
research
06/14/2021

Capacity of Gaussian Arbitrarily-Varying Fading Channels

This paper considers an arbitrarily-varying fading channel consisting of...
research
01/06/2020

Secret key authentication capacity region, Part II: typical authentication rate

This paper investigates the secret key authentication capacity region. S...
research
02/07/2022

Channel Capacity for Adversaries with Computationally Bounded Observations

We study reliable communication over point-to-point adversarial channels...
research
07/23/2018

Learning an Adversary's Actions for Secret Communication

Secure communication over a wiretap channel is investigated, in which an...
research
06/26/2019

Non-malleable Coding for Arbitrary Varying Channels

Non-malleable codes were proposed in tamper resilient cryptology with th...

Please sign up or login with your details

Forgot password? Click here to reset