TY - GEN
T1 - Structured Coding for Authentication in the Presence of a Malicious Adversary
AU - Beemer, Allison
AU - Kosut, Oliver
AU - Kliewer, Joerg
AU - Graves, Eric
AU - Yu, Paul
N1 - Publisher Copyright:
© 2019 IEEE.
PY - 2019/7
Y1 - 2019/7
N2 - Authentication in the presence of a malicious adversary consists of either recovering the legitimate transmission or declaring that the adversary has interfered with the transmission. In this work, we present a structured coding scheme for keyless authentication over a discrete memoryless binary-input, symmetric adversarial channel. Our scheme allows for coding rates up to the non-adversarial capacity of the underlying channel, as well as bounded-complexity decoding.
AB - Authentication in the presence of a malicious adversary consists of either recovering the legitimate transmission or declaring that the adversary has interfered with the transmission. In this work, we present a structured coding scheme for keyless authentication over a discrete memoryless binary-input, symmetric adversarial channel. Our scheme allows for coding rates up to the non-adversarial capacity of the underlying channel, as well as bounded-complexity decoding.
UR - http://www.scopus.com/inward/record.url?scp=85073146871&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85073146871&partnerID=8YFLogxK
U2 - 10.1109/ISIT.2019.8849581
DO - 10.1109/ISIT.2019.8849581
M3 - Conference contribution
AN - SCOPUS:85073146871
T3 - IEEE International Symposium on Information Theory - Proceedings
SP - 617
EP - 621
BT - 2019 IEEE International Symposium on Information Theory, ISIT 2019 - Proceedings
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2019 IEEE International Symposium on Information Theory, ISIT 2019
Y2 - 7 July 2019 through 12 July 2019
ER -