Multiple Access Channels with Adversarial Users

被引:0
|
作者
Sangwan, Nara [1 ]
Bakshi, Mayank [2 ]
Dey, Bikash Kurnar [3 ]
Prahliakaran, Vinod M. [1 ]
机构
[1] TIFR, Mumbai, Maharashtra, India
[2] CUHK, Hong Kong, Peoples R China
[3] Indian Inst Technol, Mumbai, Maharashtra, India
关键词
multiple access channels; adversary; authentication; authenticated communication; identification; IDENTIFICATION; AUTHENTICATION; CAPACITY;
D O I
10.1109/isit.2019.8849729
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We study authenticated communication over two-user multiple access channels (MAC) where one of the users is possibly adversarial. When both users behave non-adversarially, we want their messages to be decoded reliably. However, we also want to ensure that an adversarial user cannot cause an undetected error on the other (honest) user's message. We show that the following three-phase scheme is rate-optimal: a standard MAC code is first used to achieve unauthenticated communication; this is followed by two authentication phases where each user authenticates their message treating the other user as a possible adversary. We show that the authentication phases can be very short since this form of authentication itself, when possible, can be achieved for message sets whose size grow doubly exponentially in blocklength. This leads to our result that the authenticated communication capacity region of a discrete memoryless MAC is either zero or the (unauthenticated) MAC capacity region itself. This also, arguably, explains the similar nature of authenticated communication capacity of a discrete memoryless point-to-point adversarial channel recently found by Kosut and Kliewer (ITW, 2018). We also obtain analogous results for additive Gaussian noise channels.
引用
收藏
页码:435 / 439
页数:5
相关论文
共 50 条
  • [31] Playing games with multiple access channels
    Felix Leditzky
    Mohammad A. Alhejji
    Joshua Levin
    Graeme Smith
    Nature Communications, 11
  • [32] Covert Channels in Multiple Access Protocols
    Ahmadzadeh, Seyed Ali
    Agnew, Gordon B.
    ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2011, 41 (04) : 404 - 405
  • [33] Jamming in fading Multiple Access Channels
    Department of Electrical Engineering, Indian Institute of Technology Bombay, India
    Natl. Conf. Commun., NCC,
  • [34] DECODING FOR MULTIPLE-ACCESS CHANNELS
    BOCHAROVA, IE
    LECTURE NOTES IN COMPUTER SCIENCE, 1992, 573 : 151 - 158
  • [35] UNIVERSAL CODING FOR MULTIPLE ACCESS CHANNELS
    OHKUBO, M
    IEEE TRANSACTIONS ON INFORMATION THEORY, 1981, 27 (06) : 728 - 734
  • [36] Playing games with multiple access channels
    Leditzky, Felix
    Alhejji, Mohammad A.
    Levin, Joshua
    Smith, Graeme
    NATURE COMMUNICATIONS, 2020, 11 (01)
  • [37] Homologous Codes for Multiple Access Channels
    Sen, Pinar
    Kim, Young-Han
    2017 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2017, : 874 - 878
  • [38] On Frame Synchronization for Multiple Access Channels
    Shen, Dawei
    Zhang, Wenyi
    Reed, David P.
    Lippman, Andrew B.
    2009 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION WORKSHOPS, VOLS 1 AND 2, 2009, : 42 - 46
  • [39] Extending the capacity of multiple access channels
    Sari, H
    Vanhaverbeke, F
    Moeneclaey, M
    IEEE COMMUNICATIONS MAGAZINE, 2000, 38 (01) : 74 - 82
  • [40] Deterministic Broadcast on Multiple Access Channels
    Anantharamu, Lakshmi
    Chlebus, Bogdan S.
    Kowalski, Dariusz R.
    Rokicki, Mariusz A.
    2010 PROCEEDINGS IEEE INFOCOM, 2010,