Structured Coding for Authentication in the Presence of a Malicious Adversary

Allison Beemer, Oliver Kosut, Joerg Kliewer, Eric Graves, Paul Yu

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Authentication in the presence of a malicious adversary consists of either recovering the legitimate transmission or declaring that the adversary has interfered with the transmission. In this work, we present a structured coding scheme for keyless authentication over a discrete memoryless binary-input, symmetric adversarial channel. Our scheme allows for coding rates up to the non-adversarial capacity of the underlying channel, as well as bounded-complexity decoding.

Original languageEnglish (US)
Title of host publication2019 IEEE International Symposium on Information Theory, ISIT 2019 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages617-621
Number of pages5
ISBN (Electronic)9781538692912
DOIs
StatePublished - Jul 2019
Event2019 IEEE International Symposium on Information Theory, ISIT 2019 - Paris, France
Duration: Jul 7 2019Jul 12 2019

Publication series

NameIEEE International Symposium on Information Theory - Proceedings
Volume2019-July
ISSN (Print)2157-8095

Conference

Conference2019 IEEE International Symposium on Information Theory, ISIT 2019
CountryFrance
CityParis
Period7/7/197/12/19

Fingerprint

Authentication
Coding
Decoding
Binary

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Information Systems
  • Modeling and Simulation
  • Applied Mathematics

Cite this

Beemer, A., Kosut, O., Kliewer, J., Graves, E., & Yu, P. (2019). Structured Coding for Authentication in the Presence of a Malicious Adversary. In 2019 IEEE International Symposium on Information Theory, ISIT 2019 - Proceedings (pp. 617-621). [8849581] (IEEE International Symposium on Information Theory - Proceedings; Vol. 2019-July). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ISIT.2019.8849581

Structured Coding for Authentication in the Presence of a Malicious Adversary. / Beemer, Allison; Kosut, Oliver; Kliewer, Joerg; Graves, Eric; Yu, Paul.

2019 IEEE International Symposium on Information Theory, ISIT 2019 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 2019. p. 617-621 8849581 (IEEE International Symposium on Information Theory - Proceedings; Vol. 2019-July).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Beemer, A, Kosut, O, Kliewer, J, Graves, E & Yu, P 2019, Structured Coding for Authentication in the Presence of a Malicious Adversary. in 2019 IEEE International Symposium on Information Theory, ISIT 2019 - Proceedings., 8849581, IEEE International Symposium on Information Theory - Proceedings, vol. 2019-July, Institute of Electrical and Electronics Engineers Inc., pp. 617-621, 2019 IEEE International Symposium on Information Theory, ISIT 2019, Paris, France, 7/7/19. https://doi.org/10.1109/ISIT.2019.8849581
Beemer A, Kosut O, Kliewer J, Graves E, Yu P. Structured Coding for Authentication in the Presence of a Malicious Adversary. In 2019 IEEE International Symposium on Information Theory, ISIT 2019 - Proceedings. Institute of Electrical and Electronics Engineers Inc. 2019. p. 617-621. 8849581. (IEEE International Symposium on Information Theory - Proceedings). https://doi.org/10.1109/ISIT.2019.8849581
Beemer, Allison ; Kosut, Oliver ; Kliewer, Joerg ; Graves, Eric ; Yu, Paul. / Structured Coding for Authentication in the Presence of a Malicious Adversary. 2019 IEEE International Symposium on Information Theory, ISIT 2019 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 2019. pp. 617-621 (IEEE International Symposium on Information Theory - Proceedings).
@inproceedings{62d179ac592f45d0b722b58cc36018c8,
title = "Structured Coding for Authentication in the Presence of a Malicious Adversary",
abstract = "Authentication in the presence of a malicious adversary consists of either recovering the legitimate transmission or declaring that the adversary has interfered with the transmission. In this work, we present a structured coding scheme for keyless authentication over a discrete memoryless binary-input, symmetric adversarial channel. Our scheme allows for coding rates up to the non-adversarial capacity of the underlying channel, as well as bounded-complexity decoding.",
author = "Allison Beemer and Oliver Kosut and Joerg Kliewer and Eric Graves and Paul Yu",
year = "2019",
month = "7",
doi = "10.1109/ISIT.2019.8849581",
language = "English (US)",
series = "IEEE International Symposium on Information Theory - Proceedings",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
pages = "617--621",
booktitle = "2019 IEEE International Symposium on Information Theory, ISIT 2019 - Proceedings",

}

TY - GEN

T1 - Structured Coding for Authentication in the Presence of a Malicious Adversary

AU - Beemer, Allison

AU - Kosut, Oliver

AU - Kliewer, Joerg

AU - Graves, Eric

AU - Yu, Paul

PY - 2019/7

Y1 - 2019/7

N2 - Authentication in the presence of a malicious adversary consists of either recovering the legitimate transmission or declaring that the adversary has interfered with the transmission. In this work, we present a structured coding scheme for keyless authentication over a discrete memoryless binary-input, symmetric adversarial channel. Our scheme allows for coding rates up to the non-adversarial capacity of the underlying channel, as well as bounded-complexity decoding.

AB - Authentication in the presence of a malicious adversary consists of either recovering the legitimate transmission or declaring that the adversary has interfered with the transmission. In this work, we present a structured coding scheme for keyless authentication over a discrete memoryless binary-input, symmetric adversarial channel. Our scheme allows for coding rates up to the non-adversarial capacity of the underlying channel, as well as bounded-complexity decoding.

UR - http://www.scopus.com/inward/record.url?scp=85073146871&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85073146871&partnerID=8YFLogxK

U2 - 10.1109/ISIT.2019.8849581

DO - 10.1109/ISIT.2019.8849581

M3 - Conference contribution

AN - SCOPUS:85073146871

T3 - IEEE International Symposium on Information Theory - Proceedings

SP - 617

EP - 621

BT - 2019 IEEE International Symposium on Information Theory, ISIT 2019 - Proceedings

PB - Institute of Electrical and Electronics Engineers Inc.

ER -