101

On the Optimality of Keyless Authentication in a Noisy Model

IEEE Transactions on Information Forensics and Security (IEEE TIFS), 2014
Abstract

We further study the keyless authentication problem in a noisy model in our previous work, where no secret setup is available for sender Alice and receiver Bob while there is DMC W1W_1 from Alice to Bob and a two-way noiseless but insecure channel between them. We propose a construction such that the message length over DMC W1W_1 does not depend on the size of the source space. If the source space is S{\cal S} and the number of channel W1W_1 uses is nn, then our protocol only has a round complexity of logSlogn+4.\log^*|{\cal S}|-\log^*n+4. In addition, we show that the round complexity of any secure protocol in our model is lower bounded by logSlogn5\log^*|{\cal S}|-\log^* n-5. We also obtain a lower bound on the success probability when the message size on DMC W1W_1 is given. Finally, we derive the capacity for a non-interactive authentication protocol under general DMCs, which extends the result under BSCs in our previous work.

View on arXiv
Comments on this paper