Structured Coding for Authentication in the Presence of a Malicious Adversary

Allison Beemer, Oliver Kosut, Joerg Kliewer, Eric Graves, Paul Yu

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Authentication in the presence of a malicious adversary consists of either recovering the legitimate transmission or declaring that the adversary has interfered with the transmission. In this work, we present a structured coding scheme for keyless authentication over a discrete memoryless binary-input, symmetric adversarial channel. Our scheme allows for coding rates up to the non-adversarial capacity of the underlying channel, as well as bounded-complexity decoding.

Original languageEnglish (US)
Title of host publication2019 IEEE International Symposium on Information Theory, ISIT 2019 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages617-621
Number of pages5
ISBN (Electronic)9781538692912
DOIs
StatePublished - Jul 2019
Event2019 IEEE International Symposium on Information Theory, ISIT 2019 - Paris, France
Duration: Jul 7 2019Jul 12 2019

Publication series

NameIEEE International Symposium on Information Theory - Proceedings
Volume2019-July
ISSN (Print)2157-8095

Conference

Conference2019 IEEE International Symposium on Information Theory, ISIT 2019
CountryFrance
CityParis
Period7/7/197/12/19

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Information Systems
  • Modeling and Simulation
  • Applied Mathematics

Fingerprint Dive into the research topics of 'Structured Coding for Authentication in the Presence of a Malicious Adversary'. Together they form a unique fingerprint.

  • Cite this

    Beemer, A., Kosut, O., Kliewer, J., Graves, E., & Yu, P. (2019). Structured Coding for Authentication in the Presence of a Malicious Adversary. In 2019 IEEE International Symposium on Information Theory, ISIT 2019 - Proceedings (pp. 617-621). [8849581] (IEEE International Symposium on Information Theory - Proceedings; Vol. 2019-July). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ISIT.2019.8849581