메뉴 건너뛰기




Volumn 55, Issue 2, 2009, Pages 906-916

Authentication over noisy channels

Author keywords

Authentication; Impersonation attack; Noisy channel; Substitution attack; Wiretapper

Indexed keywords

CHANNEL CAPACITY;

EID: 61349140043     PISSN: 00189448     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIT.2008.2009842     Document Type: Article
Times cited : (101)

References (28)
  • 1
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • Oct
    • C. E. Shannon, "Communication theory of secrecy systems," Bell Syst. Tech. J., vol. 28, pp. 656-715, Oct. 1949.
    • (1949) Bell Syst. Tech. J , vol.28 , pp. 656-715
    • Shannon, C.E.1
  • 2
    • 0016562514 scopus 로고
    • The wire-tap channel
    • Oct
    • A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, pp. 1355-1387, Oct. 1975.
    • (1975) Bell Syst. Tech. J , vol.54 , pp. 1355-1387
    • Wyner, A.D.1
  • 3
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • May
    • I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. IT-24, no. 3, pp. 339-348, May 1978.
    • (1978) IEEE Trans. Inf. Theory , vol.IT-24 , Issue.3 , pp. 339-348
    • Csiszár, I.1    Körner, J.2
  • 4
    • 51349109773 scopus 로고    scopus 로고
    • The relay-eavesdropper channel: Cooperation for secrecy
    • Sep
    • L. Lai and H. El Gamal, "The relay-eavesdropper channel: Cooperation for secrecy," IEEE Trans. Inf. Theory, vol. 54, no. 9, pp. 4005-4019, Sep. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.9 , pp. 4005-4019
    • Lai, L.1    El Gamal, H.2
  • 5
    • 55349095058 scopus 로고    scopus 로고
    • The wiretap channel with feedback: Encryption over the channel
    • Nov
    • L. Lai, H. El Gamal, and H. V. Poor, "The wiretap channel with feedback: Encryption over the channel," IEEE Trans. Inf. Theory, vol. 54, no. 11, pp. 5059-5067, Nov. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.11 , pp. 5059-5067
    • Lai, L.1    El Gamal, H.2    Poor, H.V.3
  • 6
    • 54749106691 scopus 로고    scopus 로고
    • On the secrecy capacity of fading channels
    • Oct
    • P. K. Gopala, L. Lai, and H. El Gamal, "On the secrecy capacity of fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 10, pp. 4687-4698, Oct. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.10 , pp. 4687-4698
    • Gopala, P.K.1    Lai, L.2    El Gamal, H.3
  • 7
    • 40949147785 scopus 로고    scopus 로고
    • Multiple access channels with confidential messages
    • Mar
    • Y. Liang and H. V. Poor, "Multiple access channels with confidential messages," IEEE Trans. Inf. Theory, vol. 54, no. 3, pp. 976-1002, Mar. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.3 , pp. 976-1002
    • Liang, Y.1    Poor, H.V.2
  • 8
    • 45249119255 scopus 로고    scopus 로고
    • Y. Liang, H. V. Poor, and S. Shamai (Shitz), Secure communication over fading channels, IEEE Trans. Inf. Theory, 54, no. 6, pp. 2470-2492, Jun. 2008.
    • Y. Liang, H. V. Poor, and S. Shamai (Shitz), "Secure communication over fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2470-2492, Jun. 2008.
  • 10
    • 77958560746 scopus 로고    scopus 로고
    • Secure transmission with multiple antennas: The MISOME wiretap channel
    • submitted for publication
    • A. Khisti and G. W. Wornell, "Secure transmission with multiple antennas: The MISOME wiretap channel," IEEE Trans. Inf. Theory, submitted for publication.
    • IEEE Trans. Inf. Theory
    • Khisti, A.1    Wornell, G.W.2
  • 11
    • 79960996804 scopus 로고    scopus 로고
    • The secrecy capacity of the MIMO wiretap channel
    • submitted for publication
    • F. Oggier and B. Hassibi, "The secrecy capacity of the MIMO wiretap channel," IEEE Trans. Inf. Theory, submitted for publication.
    • IEEE Trans. Inf. Theory
    • Oggier, F.1    Hassibi, B.2
  • 12
    • 45249103470 scopus 로고    scopus 로고
    • Introduction to special issue on information theoretic security
    • Jun
    • H. Imai, U. Maurer, and Y. Zheng, "Introduction to special issue on information theoretic security," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2405-2407, Jun. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.6 , pp. 2405-2407
    • Imai, H.1    Maurer, U.2    Zheng, Y.3
  • 13
    • 84983269168 scopus 로고
    • Authentication theory/coding theory
    • NewYork: Springer-Verlag
    • G. J. Simmons, "Authentication theory/coding theory," in Proc. CRYPTO84 on Advances in Cryptology. NewYork: Springer-Verlag, 1985, pp. 411-431.
    • (1985) Proc. CRYPTO84 on Advances in Cryptology , pp. 411-431
    • Simmons, G.J.1
  • 14
    • 0028514178 scopus 로고
    • Lower bounds on the probability of deception in authentication with arbitration
    • Sep
    • T. Johansson, "Lower bounds on the probability of deception in authentication with arbitration," IEEE Trans. Inf. Theory, vol. 40, no. 5, pp. 1573-1585, Sep. 1994.
    • (1994) IEEE Trans. Inf. Theory , vol.40 , Issue.5 , pp. 1573-1585
    • Johansson, T.1
  • 15
    • 0347188260 scopus 로고
    • Arbitrated unconditionally secure authentication can be unconditionally protected against arbiter's attacks
    • Santa Barbara, CA
    • Y. Desmedt and M. Yung, "Arbitrated unconditionally secure authentication can be unconditionally protected against arbiter's attacks," in Proc. Int. Cryptology Conf., Santa Barbara, CA, 1990, pp. 177-188.
    • (1990) Proc. Int. Cryptology Conf , pp. 177-188
    • Desmedt, Y.1    Yung, M.2
  • 16
    • 0034228863 scopus 로고    scopus 로고
    • Authentication theory and hypothesis testing
    • Jul
    • U. M. Maurer, "Authentication theory and hypothesis testing," IEEE Trans. Inf. Theory, vol. 46, no. 7, pp. 1350-1356, Jul. 2000.
    • (2000) IEEE Trans. Inf. Theory , vol.46 , Issue.7 , pp. 1350-1356
    • Maurer, U.M.1
  • 17
    • 0026191173 scopus 로고
    • Strengthening Simmons' bound on impersonation
    • Jul
    • R. Johannesson and A. Sgarro, "Strengthening Simmons' bound on impersonation," IEEE Trans. Inf. Theory, vol. 37, no. 4, pp. 1182-1185, Jul. 1991.
    • (1991) IEEE Trans. Inf. Theory , vol.37 , Issue.4 , pp. 1182-1185
    • Johannesson, R.1    Sgarro, A.2
  • 18
    • 33845637231 scopus 로고    scopus 로고
    • The CRC-NTMAC for noisy message authentication
    • Dec
    • Y. Liu and C. G. Boncelet, "The CRC-NTMAC for noisy message authentication," IEEE Trans. Inf. Forensics and Security, vol. 1, no. 4, pp. 517-523, Dec. 2006.
    • (2006) IEEE Trans. Inf. Forensics and Security , vol.1 , Issue.4 , pp. 517-523
    • Liu, Y.1    Boncelet, C.G.2
  • 19
    • 33645004780 scopus 로고    scopus 로고
    • The NTMAC for authentication of noisy messages
    • Mar
    • C. G. Boncelet, "The NTMAC for authentication of noisy messages," IEEE Trans. Inf. Forensics and Security, vol. 1, no. 1, pp. 35-42, Mar. 2006.
    • (2006) IEEE Trans. Inf. Forensics and Security , vol.1 , Issue.1 , pp. 35-42
    • Boncelet, C.G.1
  • 21
    • 0009801824 scopus 로고    scopus 로고
    • Information-theoretic key agreement: From weak to strong secrecy for free
    • Bruges Brugge, Belgium, May
    • U. M. Maurer and S. Wolf, "Information-theoretic key agreement: From weak to strong secrecy for free," in Proc. Advances in Cryptology-EUROCRYPT, Bruges (Brugge), Belgium, May 2000, pp. 356-373.
    • (2000) Proc. Advances in Cryptology-EUROCRYPT , pp. 356-373
    • Maurer, U.M.1    Wolf, S.2
  • 22
    • 33750056552 scopus 로고    scopus 로고
    • Almost independence and secrecy capacity
    • Jan
    • I. Csiszár, "Almost independence and secrecy capacity," Probl. Inf. Transm., vol. 32, pp. 40-47, Jan. 1996.
    • (1996) Probl. Inf. Transm , vol.32 , pp. 40-47
    • Csiszár, I.1
  • 23
    • 0031701886 scopus 로고    scopus 로고
    • Common randomness in information theory and cryptography, Part II: CR capacity
    • Jan
    • R. Ahlswede and I. Csiszár, "Common randomness in information theory and cryptography, Part II: CR capacity," IEEE Trans. Inf. Theory, vol. 44, no. 1, pp. 225-240, Jan. 1998.
    • (1998) IEEE Trans. Inf. Theory , vol.44 , Issue.1 , pp. 225-240
    • Ahlswede, R.1    Csiszár, I.2
  • 24
    • 0011321632 scopus 로고
    • Repeated use of codes which detect deception
    • Mar
    • V. Fak, "Repeated use of codes which detect deception," IEEE Trans. Inf. Theory, vol. IT-25, no. 4, pp. 233-234, Mar. 1979.
    • (1979) IEEE Trans. Inf. Theory , vol.IT-25 , Issue.4 , pp. 233-234
    • Fak, V.1
  • 25
    • 0027607095 scopus 로고
    • A lower bound on authentication after having observed a sequence of messages
    • Mar
    • U. Rosenbaum, "A lower bound on authentication after having observed a sequence of messages," J. Cryptol., vol. 6, pp. 135-156, Mar. 1993.
    • (1993) J. Cryptol , vol.6 , pp. 135-156
    • Rosenbaum, U.1
  • 26
    • 0028514064 scopus 로고
    • Bounds on the probability of deception in multiple authentication
    • Sep
    • B. Smeets, "Bounds on the probability of deception in multiple authentication," IEEE Trans. Inf. Theory, vol. 40, no. 5, pp. 1586-1591, Sep. 1994.
    • (1994) IEEE Trans. Inf. Theory , vol.40 , Issue.5 , pp. 1586-1591
    • Smeets, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.