Structured Coding for Authentication in the Presence of a Malicious Adversary

Document Type

Conference Proceeding

Publication Date

7-1-2019

Abstract

Authentication in the presence of a malicious adversary consists of either recovering the legitimate transmission or declaring that the adversary has interfered with the transmission. In this work, we present a structured coding scheme for keyless authentication over a discrete memoryless binary-input, symmetric adversarial channel. Our scheme allows for coding rates up to the non-adversarial capacity of the underlying channel, as well as bounded-complexity decoding.

Identifier

85073146871 (Scopus)

ISBN

[9781538692912]

Publication Title

IEEE International Symposium on Information Theory Proceedings

External Full Text Location

https://doi.org/10.1109/ISIT.2019.8849581

ISSN

21578095

First Page

617

Last Page

621

Volume

2019-July

Grant

W911NF-17-2-0183

Fund Ref

U.S. Army Combat Capabilities Development Command

This document is currently not available here.

Share

COinS