Multiple Access Channels with Adversarial Users

被引:0
|
作者
Sangwan, Nara [1 ]
Bakshi, Mayank [2 ]
Dey, Bikash Kurnar [3 ]
Prahliakaran, Vinod M. [1 ]
机构
[1] TIFR, Mumbai, Maharashtra, India
[2] CUHK, Hong Kong, Peoples R China
[3] Indian Inst Technol, Mumbai, Maharashtra, India
来源
2019 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT) | 2019年
关键词
multiple access channels; adversary; authentication; authenticated communication; identification; IDENTIFICATION; AUTHENTICATION; CAPACITY;
D O I
10.1109/isit.2019.8849729
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We study authenticated communication over two-user multiple access channels (MAC) where one of the users is possibly adversarial. When both users behave non-adversarially, we want their messages to be decoded reliably. However, we also want to ensure that an adversarial user cannot cause an undetected error on the other (honest) user's message. We show that the following three-phase scheme is rate-optimal: a standard MAC code is first used to achieve unauthenticated communication; this is followed by two authentication phases where each user authenticates their message treating the other user as a possible adversary. We show that the authentication phases can be very short since this form of authentication itself, when possible, can be achieved for message sets whose size grow doubly exponentially in blocklength. This leads to our result that the authenticated communication capacity region of a discrete memoryless MAC is either zero or the (unauthenticated) MAC capacity region itself. This also, arguably, explains the similar nature of authenticated communication capacity of a discrete memoryless point-to-point adversarial channel recently found by Kosut and Kliewer (ITW, 2018). We also obtain analogous results for additive Gaussian noise channels.
引用
收藏
页码:435 / 439
页数:5
相关论文
共 50 条
  • [1] Multiple Access Channels with Byzantine Users
    Sangwan, Neha
    Akshi, Mayank B.
    Dey, Bikash Kumar
    Prabhakaran, Vinod M.
    2019 IEEE INFORMATION THEORY WORKSHOP (ITW), 2019, : 160 - 164
  • [2] Byzantine Multiple Access Channels-Part II: Communication With Adversary Identification
    Sangwan, Neha
    Bakshi, Mayank
    Dey, Bikash Kumar
    Prabhakaran, Vinod M.
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2025, 71 (01) : 23 - 60
  • [3] Multiple Access Channels With Combined Cooperation and Partial Cribbing
    Kopetz, Tal
    Permuter, Haim H.
    Shamai, Shlomo
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2016, 62 (02) : 825 - 848
  • [4] Communication With Adversary Identification in Byzantine Multiple Access Channels
    Sangwan, Neha
    Bakshi, Mayank
    Dey, Bikash Kumar
    Prabhakaran, Vinod M.
    2021 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2021, : 688 - 693
  • [5] Multiple Access Gaussian Channels with Feedback
    Freudenberg, J. S.
    Middleton, R. H.
    2014 IEEE 53RD ANNUAL CONFERENCE ON DECISION AND CONTROL (CDC), 2014, : 3203 - 3208
  • [6] Playing games with multiple access channels
    Leditzky, Felix
    Alhejji, Mohammad A.
    Levin, Joshua
    Smith, Graeme
    NATURE COMMUNICATIONS, 2020, 11 (01)
  • [7] Lossy State Communication over Fading Multiple Access Channels
    Ramachandran, Viswanathan
    ENTROPY, 2023, 25 (04)
  • [8] Random access over multiple access channels: A queuing perspective
    Bodas, Shreeshankar
    Vishwanath, Sriram
    Subramanian, Vijay
    2008 42ND ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS, VOLS 1-3, 2008, : 797 - +
  • [9] Private Classical Communication Over Quantum Multiple-Access Channels
    Chou, Remi A.
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2022, 68 (03) : 1782 - 1794
  • [10] Distributed State Estimation with Bounded Errors over Multiple Access Channels
    Zafzouf, Ghassen
    Nair, Girish N.
    2020 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2020, : 2861 - 2866