Communications in Computer and Information Science
DOI: 10.1007/978-3-540-73986-9_9
|View full text |Cite
|
Sign up to set email alerts
|

Performance Evaluation of Keyless Authentication Based on Noisy Channel

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Publication Types

Select...
2
2
1

Relationship

1
4

Authors

Journals

citations
Cited by 14 publications
(9 citation statements)
references
References 4 publications
0
9
0
Order By: Relevance
“…PHY-layer message authentication can be traced back to Simmons' work in [16], where an authentication model over noiseless channels was proposed. Recently, authentication over noise channel models drawn increasing attentions [21]- [25]. The authentication over noise source model with a (noiseless) public discussion channel was studied by Korzhik et al [21].…”
Section: B Phy-layer Message Authenticationmentioning
confidence: 99%
See 1 more Smart Citation
“…PHY-layer message authentication can be traced back to Simmons' work in [16], where an authentication model over noiseless channels was proposed. Recently, authentication over noise channel models drawn increasing attentions [21]- [25]. The authentication over noise source model with a (noiseless) public discussion channel was studied by Korzhik et al [21].…”
Section: B Phy-layer Message Authenticationmentioning
confidence: 99%
“…Recently, authentication over noise channel models drawn increasing attentions [21]- [25]. The authentication over noise source model with a (noiseless) public discussion channel was studied by Korzhik et al [21]. To achieve information-theoretic security for multiple messages authentication, Lai et al [22] studied the message authentication over noisy channel, as shown in Fig.…”
Section: B Phy-layer Message Authenticationmentioning
confidence: 99%
“…Recently, authentication over noise channel models drawn increasing attentions [29]- [34]. The authentication over noise source model with a (noiseless) public discussion channel was studied by Korzhik et al in [29] and Barni in [30]. After that, the authentication over MIMO fading wiretap channels was considered by Baracca et al in [31] and Ferrante et al in [32].…”
Section: B Phy-layer Message Authenticationmentioning
confidence: 99%
“…Even though secret sharing over noisy channels has been extensively studied, the attention to its sibling message authentication is far from enough. Korzhik et al [3] considered the authentication problem over a (noiseless) public discussion channel under the initialization from the noisy channels so that the sender, the receiver and the attacker hold some correlated data. So they essentially considered the authentication in the noiseless channel with a noisy initialization (or simply in the source model [8]).…”
Section: A Related Workmentioning
confidence: 99%