Authentication with Mildly Myopic Adversaries
Title | Authentication with Mildly Myopic Adversaries |
Publication Type | Conference Paper |
Year of Publication | 2020 |
Authors | Beemer, A., Graves, E., Kliewer, J., Kosut, O., Yu, P. |
Conference Name | 2020 IEEE International Symposium on Information Theory (ISIT) |
Date Published | June 2020 |
Publisher | IEEE |
ISBN Number | 978-1-7281-6432-8 |
Keywords | Adversary Models, binary channel model, channel capacity, channel coding, channel condition, channel states, cryptographic protocols, deterministic encoder, essentially omniscient adversary, Human Behavior, keyless authentication, malicious adversary, message authentication, Metrics, mildly myopic adversaries, no-adversary capacity, noisy versions, positive authentication capacity, pubcrawl, received information, resilience, Resiliency, Scalability, stochastic encoder, sufficient condition, telecommunication channels, telecommunication security, transmitted sequences, underlying channel, unsecured communications settings, zero authentication capacity |
Abstract | In unsecured communications settings, ascertaining the trustworthiness of received information, called authentication, is paramount. We consider keyless authentication over an arbitrarily-varying channel, where channel states are chosen by a malicious adversary with access to noisy versions of transmitted sequences. We have shown previously that a channel condition termed U-overwritability is a sufficient condition for zero authentication capacity over such a channel, and also that with a deterministic encoder, a sufficiently clear-eyed adversary is essentially omniscient. In this paper, we show that even if the authentication capacity with a deterministic encoder and an essentially omniscient adversary is zero, allowing a stochastic encoder can result in a positive authentication capacity. Furthermore, the authentication capacity with a stochastic encoder can be equal to the no-adversary capacity of the underlying channel in this case. We illustrate this for a binary channel model, which provides insight into the more general case. |
URL | https://ieeexplore.ieee.org/document/9174179 |
DOI | 10.1109/ISIT44484.2020.9174179 |
Citation Key | beemer_authentication_2020 |
- no-adversary capacity
- zero authentication capacity
- unsecured communications settings
- underlying channel
- transmitted sequences
- telecommunication security
- telecommunication channels
- sufficient condition
- stochastic encoder
- Scalability
- Resiliency
- resilience
- received information
- pubcrawl
- positive authentication capacity
- noisy versions
- Adversary Models
- mildly myopic adversaries
- Metrics
- message authentication
- malicious adversary
- keyless authentication
- Human behavior
- essentially omniscient adversary
- deterministic encoder
- Cryptographic Protocols
- channel states
- channel condition
- channel coding
- channel capacity
- binary channel model