ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1708.02888
29
1

Multi-message Authentication over Noisy Channel with Secure Channel Codes

9 August 2017
Dajiang Chen
Ning Zhang
Nan Cheng
Kuan Zhang
Kan Yang
Zhiguang Qin
Xuemin Shen
ArXiv (abs)PDFHTML
Abstract

In this paper, we investigate multi-message authentication to combat adversaries with infinite computational capacity. An authentication framework over a wiretap channel (W1,W2)(W_1,W_2)(W1​,W2​) is proposed to achieve information-theoretic security with the same key. The proposed framework bridges the two research areas in physical (PHY) layer security: secure transmission and message authentication. Specifically, the sender Alice first transmits message MMM to the receiver Bob over (W1,W2)(W_1,W_2)(W1​,W2​) with an error correction code; then Alice employs a hash function (i.e., ε\varepsilonε-AWU2_22​ hash functions) to generate a message tag SSS of message MMM using key KKK, and encodes SSS to a codeword XnX^nXn by leveraging an existing strongly secure channel coding with exponentially small (in code length nnn) average probability of error; finally, Alice sends XnX^nXn over (W1,W2)(W_1,W_2)(W1​,W2​) to Bob who authenticates the received messages. We develop a theorem regarding the requirements/conditions for the authentication framework to be information-theoretic secure for authenticating a polynomial number of messages in terms of nnn. Based on this theorem, we propose an authentication protocol that can guarantee the security requirements, and prove its authentication rate can approach infinity when nnn goes to infinity. Furthermore, we design and implement an efficient and feasible authentication protocol over binary symmetric wiretap channel (BSWC) by using \emph{Linear Feedback Shifting Register} based (LFSR-based) hash functions and strong secure polar code. Through extensive experiments, it is demonstrated that the proposed protocol can achieve low time cost, high authentication rate, and low authentication error rate.

View on arXiv
Comments on this paper