Structured Coding for Authentication in the Presence of a Malicious Adversary
Document Type
Conference Proceeding
Publication Date
7-1-2019
Abstract
Authentication in the presence of a malicious adversary consists of either recovering the legitimate transmission or declaring that the adversary has interfered with the transmission. In this work, we present a structured coding scheme for keyless authentication over a discrete memoryless binary-input, symmetric adversarial channel. Our scheme allows for coding rates up to the non-adversarial capacity of the underlying channel, as well as bounded-complexity decoding.
Identifier
85073146871 (Scopus)
ISBN
[9781538692912]
Publication Title
IEEE International Symposium on Information Theory Proceedings
External Full Text Location
https://doi.org/10.1109/ISIT.2019.8849581
ISSN
21578095
First Page
617
Last Page
621
Volume
2019-July
Grant
W911NF-17-2-0183
Fund Ref
U.S. Army Combat Capabilities Development Command
Recommended Citation
Beemer, Allison; Kosut, Oliver; Kliewer, Joerg; Graves, Eric; and Yu, Paul, "Structured Coding for Authentication in the Presence of a Malicious Adversary" (2019). Faculty Publications. 7501.
https://digitalcommons.njit.edu/fac_pubs/7501
