TY - GEN
T1 - Multiuser authentication with anonymity constraints over noisy channels
AU - Chou, Remi A.
AU - Yener, Aylin
N1 - Publisher Copyright:
© 2016 IEEE.
PY - 2016/8/10
Y1 - 2016/8/10
N2 - We consider authentication of messages sent by L legitimate transmitters to a legitimate receiver over a noisy multiple access channel. We assume the presence of a computationally unbounded opponent who has access to noisy observations of the messages transmitted, and can perform impersonation or substitution attacks. In addition, we consider anonymity constraints where the legitimate receiver must be able to authenticate the messages he receives with respect to predetermined groups of transmitters, but must be kept ignorant of the transmitter's identity of a given message in a given group. Our main result is an authentication coding scheme for which asymptotically matching upper and lower bounds on the probability of successful attack are derived. Our result analytically quantifies the impact of a multiuser setting compared to a single-user setting, as well as the negative impact of anonymity constraints on the probability of successful attack.
AB - We consider authentication of messages sent by L legitimate transmitters to a legitimate receiver over a noisy multiple access channel. We assume the presence of a computationally unbounded opponent who has access to noisy observations of the messages transmitted, and can perform impersonation or substitution attacks. In addition, we consider anonymity constraints where the legitimate receiver must be able to authenticate the messages he receives with respect to predetermined groups of transmitters, but must be kept ignorant of the transmitter's identity of a given message in a given group. Our main result is an authentication coding scheme for which asymptotically matching upper and lower bounds on the probability of successful attack are derived. Our result analytically quantifies the impact of a multiuser setting compared to a single-user setting, as well as the negative impact of anonymity constraints on the probability of successful attack.
UR - http://www.scopus.com/inward/record.url?scp=84985903288&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84985903288&partnerID=8YFLogxK
U2 - 10.1109/ISIT.2016.7541737
DO - 10.1109/ISIT.2016.7541737
M3 - Conference contribution
AN - SCOPUS:84985903288
T3 - IEEE International Symposium on Information Theory - Proceedings
SP - 2439
EP - 2443
BT - Proceedings - ISIT 2016; 2016 IEEE International Symposium on Information Theory
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2016 IEEE International Symposium on Information Theory, ISIT 2016
Y2 - 10 July 2016 through 15 July 2016
ER -