On the Optimality of Keyless Authentication in a Noisy Model
We further study the keyless authentication problem in a noisy model in our previous work, where no secret setup is available for sender Alice and receiver Bob while there is DMC from Alice to Bob and a two-way noiseless but insecure channel between them. We propose a construction such that the message length over DMC does not depend on the size of the source space. If the source space is and the number of channel uses is , then our protocol only has a round complexity of In addition, we show that the round complexity of any secure protocol in our model is lower bounded by . We also obtain a lower bound on the success probability when the message size on DMC is given. Finally, we derive the capacity for a non-interactive authentication protocol under general DMCs, which extends the result under BSCs in our previous work.
View on arXiv