Loading [MathJax]/extensions/MathMenu.js
Structured Coding for Authentication in the Presence of a Malicious Adversary | IEEE Conference Publication | IEEE Xplore

Structured Coding for Authentication in the Presence of a Malicious Adversary


Abstract:

Authentication in the presence of a malicious adversary consists of either recovering the legitimate transmission or declaring that the adversary has interfered with the ...Show More

Abstract:

Authentication in the presence of a malicious adversary consists of either recovering the legitimate transmission or declaring that the adversary has interfered with the transmission. In this work, we present a structured coding scheme for keyless authentication over a discrete memoryless binary-input, symmetric adversarial channel. Our scheme allows for coding rates up to the non-adversarial capacity of the underlying channel, as well as bounded-complexity decoding.
Date of Conference: 07-12 July 2019
Date Added to IEEE Xplore: 26 September 2019
ISBN Information:

ISSN Information:

Conference Location: Paris, France

Contact IEEE to Subscribe

References

References is not available for this document.