Visible to the public Authentication with Mildly Myopic Adversaries

TitleAuthentication with Mildly Myopic Adversaries
Publication TypeConference Paper
Year of Publication2020
AuthorsBeemer, A., Graves, E., Kliewer, J., Kosut, O., Yu, P.
Conference Name2020 IEEE International Symposium on Information Theory (ISIT)
Date PublishedJune 2020
PublisherIEEE
ISBN Number978-1-7281-6432-8
KeywordsAdversary Models, binary channel model, channel capacity, channel coding, channel condition, channel states, cryptographic protocols, deterministic encoder, essentially omniscient adversary, Human Behavior, keyless authentication, malicious adversary, message authentication, Metrics, mildly myopic adversaries, no-adversary capacity, noisy versions, positive authentication capacity, pubcrawl, received information, resilience, Resiliency, Scalability, stochastic encoder, sufficient condition, telecommunication channels, telecommunication security, transmitted sequences, underlying channel, unsecured communications settings, zero authentication capacity
Abstract

In unsecured communications settings, ascertaining the trustworthiness of received information, called authentication, is paramount. We consider keyless authentication over an arbitrarily-varying channel, where channel states are chosen by a malicious adversary with access to noisy versions of transmitted sequences. We have shown previously that a channel condition termed U-overwritability is a sufficient condition for zero authentication capacity over such a channel, and also that with a deterministic encoder, a sufficiently clear-eyed adversary is essentially omniscient. In this paper, we show that even if the authentication capacity with a deterministic encoder and an essentially omniscient adversary is zero, allowing a stochastic encoder can result in a positive authentication capacity. Furthermore, the authentication capacity with a stochastic encoder can be equal to the no-adversary capacity of the underlying channel in this case. We illustrate this for a binary channel model, which provides insight into the more general case.

URLhttps://ieeexplore.ieee.org/document/9174179
DOI10.1109/ISIT44484.2020.9174179
Citation Keybeemer_authentication_2020