Log In Sign Up

Secret key authentication capacity region, Part I: average authentication rate

by   Jake Perazzone, et al.

This paper investigates the secret key authentication capacity region. Specifically, the focus is on a model where a source must transmit information over an adversary controlled channel where the adversary, prior to the source's transmission, decides whether or not to replace the destination's observation with an arbitrary one of their choosing (done in hopes of having the destination accept a false message). To combat the adversary, the source and destination share a secret key which they may use to guarantee authenticated communications. The secret key authentication capacity region here is then defined as the region of jointly achievable message rate, authentication rate, and key consumption rate (i.e., how many bits of secret key are needed). This is the first of a two part study, with the parts differing in how the authentication rate is measured. In this first study the authenticated rate is measured by the traditional metric of the maximum expected probability of false authentication. For this metric, we provide an inner bound which improves on those existing in the literature. This is achieved by adopting and merging different classical techniques in novel ways. Within these classical techniques, one technique derives authentication capability directly from the noisy communications channel, and the other technique derives its' authentication capability directly from obscuring the source.


page 1

page 2

page 3

page 4


Secret key authentication capacity region, Part II: typical authentication rate

This paper investigates the secret key authentication capacity region. S...

Keyless Authentication for AWGN Channels

This work establishes that the physical layer can be used to perform inf...

Inner Bound for the Capacity Region of Noisy Channels with an Authentication Requirement

The rate regions of many variations of the standard and wire-tap channel...

Composable, Unconditionally Secure Message Authentication without any Secret Key

We consider a setup in which the channel from Alice to Bob is less noisy...

Keyless authentication in the presence of a simultaneously transmitting adversary

If Alice must communicate with Bob over a channel shared with the advers...

False-Accept/False-Reject Trade-offs in Biometric Authentication Systems

Biometric authentication systems, based on secret key generation, work a...

Guesswork Subject to a Total Entropy Budget

We consider an abstraction of computational security in password protect...