Multiuser authentication with anonymity constraints over noisy channels

Remi A. Chou, Aylin Yener

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations

    Abstract

    We consider authentication of messages sent by L legitimate transmitters to a legitimate receiver over a noisy multiple access channel. We assume the presence of a computationally unbounded opponent who has access to noisy observations of the messages transmitted, and can perform impersonation or substitution attacks. In addition, we consider anonymity constraints where the legitimate receiver must be able to authenticate the messages he receives with respect to predetermined groups of transmitters, but must be kept ignorant of the transmitter's identity of a given message in a given group. Our main result is an authentication coding scheme for which asymptotically matching upper and lower bounds on the probability of successful attack are derived. Our result analytically quantifies the impact of a multiuser setting compared to a single-user setting, as well as the negative impact of anonymity constraints on the probability of successful attack.

    Original languageEnglish (US)
    Title of host publicationProceedings - ISIT 2016; 2016 IEEE International Symposium on Information Theory
    PublisherInstitute of Electrical and Electronics Engineers Inc.
    Pages2439-2443
    Number of pages5
    ISBN (Electronic)9781509018062
    DOIs
    StatePublished - Aug 10 2016
    Event2016 IEEE International Symposium on Information Theory, ISIT 2016 - Barcelona, Spain
    Duration: Jul 10 2016Jul 15 2016

    Publication series

    NameIEEE International Symposium on Information Theory - Proceedings
    Volume2016-August
    ISSN (Print)2157-8095

    Other

    Other2016 IEEE International Symposium on Information Theory, ISIT 2016
    Country/TerritorySpain
    CityBarcelona
    Period7/10/167/15/16

    All Science Journal Classification (ASJC) codes

    • Theoretical Computer Science
    • Information Systems
    • Modeling and Simulation
    • Applied Mathematics

    Fingerprint

    Dive into the research topics of 'Multiuser authentication with anonymity constraints over noisy channels'. Together they form a unique fingerprint.

    Cite this