Authentication and Partial Message Correction over Adversarial Multiple-Access Channels

Allison Beemer, Eric Graves, Joerg Kliewer, Oliver Kosut, Paul Yu

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Scopus citations

Abstract

In this paper, we present results on the authentication capacity region for the two-user arbitrarily-varying multipleaccess channel. We first consider a standard definition of authentication, in which the receiver may discard both messages if an adversary is detected. For this setting, we show that an extension of the arbitrarily-varying channel condition overwritability characterizes the authentication capacity region. We then define γ-correcting authentication, where we require that at least a γ fraction of the users' messages be correctable, even in the presence of an adversary. We give necessary conditions for the γ-correcting authentication capacity region to have nonempty interior, and show that positive rate pairs are achievable over a particular channel that satisfies these conditions.

Original languageEnglish (US)
Title of host publication2020 IEEE Conference on Communications and Network Security, CNS 2020
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781728147604
DOIs
StatePublished - Jun 2020
Event2020 IEEE Conference on Communications and Network Security, CNS 2020 - Virtual, Online, France
Duration: Jun 29 2020Jul 1 2020

Publication series

Name2020 IEEE Conference on Communications and Network Security, CNS 2020

Conference

Conference2020 IEEE Conference on Communications and Network Security, CNS 2020
Country/TerritoryFrance
CityVirtual, Online
Period6/29/207/1/20

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Information Systems and Management
  • Safety, Risk, Reliability and Quality
  • Control and Optimization

Fingerprint

Dive into the research topics of 'Authentication and Partial Message Correction over Adversarial Multiple-Access Channels'. Together they form a unique fingerprint.

Cite this