Multiple Access Channels with Adversarial Users

被引:0
|
作者
Sangwan, Nara [1 ]
Bakshi, Mayank [2 ]
Dey, Bikash Kurnar [3 ]
Prahliakaran, Vinod M. [1 ]
机构
[1] TIFR, Mumbai, Maharashtra, India
[2] CUHK, Hong Kong, Peoples R China
[3] Indian Inst Technol, Mumbai, Maharashtra, India
关键词
multiple access channels; adversary; authentication; authenticated communication; identification; IDENTIFICATION; AUTHENTICATION; CAPACITY;
D O I
10.1109/isit.2019.8849729
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We study authenticated communication over two-user multiple access channels (MAC) where one of the users is possibly adversarial. When both users behave non-adversarially, we want their messages to be decoded reliably. However, we also want to ensure that an adversarial user cannot cause an undetected error on the other (honest) user's message. We show that the following three-phase scheme is rate-optimal: a standard MAC code is first used to achieve unauthenticated communication; this is followed by two authentication phases where each user authenticates their message treating the other user as a possible adversary. We show that the authentication phases can be very short since this form of authentication itself, when possible, can be achieved for message sets whose size grow doubly exponentially in blocklength. This leads to our result that the authenticated communication capacity region of a discrete memoryless MAC is either zero or the (unauthenticated) MAC capacity region itself. This also, arguably, explains the similar nature of authenticated communication capacity of a discrete memoryless point-to-point adversarial channel recently found by Kosut and Kliewer (ITW, 2018). We also obtain analogous results for additive Gaussian noise channels.
引用
收藏
页码:435 / 439
页数:5
相关论文
共 50 条
  • [1] Broadcasting on Adversarial Multiple Access Channels
    Aldawsari, Bader A.
    Chlebus, Bogdan S.
    Kowalski, Dariusz R.
    2019 IEEE 18TH INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA), 2019, : 327 - 330
  • [2] Multiple Access Channels with Byzantine Users
    Sangwan, Neha
    Akshi, Mayank B.
    Dey, Bikash Kumar
    Prabhakaran, Vinod M.
    2019 IEEE INFORMATION THEORY WORKSHOP (ITW), 2019, : 160 - 164
  • [3] Adversarial Multiple Access Channels with Individual Injection Rates
    Lakshmi Anantharamu
    Bogdan S. Chlebus
    Mariusz A. Rokicki
    Theory of Computing Systems, 2017, 61 : 820 - 850
  • [4] Maximum throughput of multiple access channels in adversarial environments
    Chlebus, Bogdan S.
    Kowalski, Dariusz R.
    Rokicki, Mariusz A.
    DISTRIBUTED COMPUTING, 2009, 22 (02) : 93 - 116
  • [5] Maximum throughput of multiple access channels in adversarial environments
    Bogdan S. Chlebus
    Dariusz R. Kowalski
    Mariusz A. Rokicki
    Distributed Computing, 2009, 22 : 93 - 116
  • [6] Adversarial Multiple Access Channels with Individual Injection Rates
    Anantharamu, Lakshmi
    Chlebus, Bogdan S.
    Rokicki, Mariusz A.
    THEORY OF COMPUTING SYSTEMS, 2017, 61 (03) : 820 - 850
  • [7] Packet latency of deterministic broadcasting in adversarial multiple access channels
    Anantharamu, Lakshmi
    Chlebus, Bogdan S.
    Kowalski, Dariusz R.
    Rokicki, Mariusz A.
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2019, 99 : 27 - 52
  • [8] Interference Cancellation and Detection for Multiple Access Channels with Four Users
    Li, Feng
    Jafarkhani, Hamid
    2010 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2010,
  • [9] Adversarial multiple access channels and a new model of multimedia fingerprinting coding
    Kabatiansky, Grigory
    Egorova, Elena
    2020 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2020,
  • [10] On the Capacity of Strong Asynchronous Multiple Access Channels with a Large Number of Users
    Shahi, Sara
    Tuninetti, Daniela
    Devroye, Natasha
    2016 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, 2016, : 1486 - 1490