{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T21:16:04Z","timestamp":1760217364351,"version":"build-2065373602"},"reference-count":28,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2015,1,14]],"date-time":"2015-01-14T00:00:00Z","timestamp":1421193600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Basic Research Program of China","doi-asserted-by":"publisher","award":["2013CB329002"],"award-info":[{"award-number":["2013CB329002"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Keygrant Project of Chinese Ministry of Education","award":["313005"],"award-info":[{"award-number":["313005"]}]},{"name":"National S&amp;T Major Project","award":["2013ZX03001024-004"],"award-info":[{"award-number":["2013ZX03001024-004"]}]},{"name":"Tsinghua-Qualcomm Joint Research Program"},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61201192","61172097"],"award-info":[{"award-number":["61201192","61172097"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"International Science and Technology Cooperation Program","award":["2012DFG12010"],"award-info":[{"award-number":["2012DFG12010"]}]},{"name":"Natural 206 Science Technology of Fujian","award":["2013H0048"],"award-info":[{"award-number":["2013H0048"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Entropy"],"abstract":"<jats:p>The essence of authentication is the transmission of unique and irreproducible information. In this paper, the authentication becomes a problem of the secure transmission of the secret key over noisy channels. A general analysis and design framework for message authentication is presented based on the results of Wyner\u2019s wiretap channel. Impersonation and substitution attacks are primarily investigated. Information-theoretic lower and upper bounds on the opponent\u2019s success probability are derived, and the lower bound and the upper bound are shown to match. In general, the fundamental limits on message authentication over noisy channels are fully characterized. Analysis results demonstrate that introducing noisy channels is a reliable way to enhance the security of authentication.<\/jats:p>","DOI":"10.3390\/e17010368","type":"journal-article","created":{"date-parts":[[2015,1,14]],"date-time":"2015-01-14T10:33:15Z","timestamp":1421231595000},"page":"368-383","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Message Authentication over Noisy Channels"],"prefix":"10.3390","volume":"17","author":[{"given":"Fanfan","family":"Zheng","sequence":"first","affiliation":[{"name":"Department of Communication Engineering, Xiamen University, Xiamen 361005, China"}]},{"given":"Zhiqing","family":"Xiao","sequence":"additional","affiliation":[{"name":"Department of Electronic Engineering, Tsinghua University, Beijing 100084, China"}]},{"given":"Shidong","family":"Zhou","sequence":"additional","affiliation":[{"name":"Department of Electronic Engineering, Tsinghua University, Beijing 100084, China"},{"name":"State Key Laboratory on Microwave and Digital Communications, Tsinghua University, Beijing 100084, China"},{"name":"Tsinghua National Laboratory for Information Science and Technology, Tsinghua University, Beijing 100084, China"}]},{"given":"Jing","family":"Wang","sequence":"additional","affiliation":[{"name":"Department of Electronic Engineering, Tsinghua University, Beijing 100084, China"},{"name":"State Key Laboratory on Microwave and Digital Communications, Tsinghua University, Beijing 100084, China"},{"name":"Tsinghua National Laboratory for Information Science and Technology, Tsinghua University, Beijing 100084, China"}]},{"given":"Lianfen","family":"Huang","sequence":"additional","affiliation":[{"name":"Department of Communication Engineering, Xiamen University, Xiamen 361005, China"}]}],"member":"1968","published-online":{"date-parts":[[2015,1,14]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Yu, P., Baras, J., and Sadler, B. (2009). An Implementation of Physical Layer Authentication Using Software Radio, U.S. Army Research Laboratory.","DOI":"10.21236\/ADA502531"},{"key":"ref_2","unstructured":"Yu, T., Hartman, S., and Raeburn, K. Available online: http:\/\/www.internetsociety.org\/doc\/perils-unauthenticated-encryption-kerberos-version-4."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/TIFS.2007.916273","article-title":"Physical-layer authentication","volume":"3","author":"Yu","year":"2008","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"244","DOI":"10.1109\/TBC.2004.834027","article-title":"Transmitter identification using embedded pseudo random sequences","volume":"50","author":"Wang","year":"2004","journal-title":"IEEE Trans. Broadcast."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1109\/TIFS.2005.863505","article-title":"Analysis and design of secure watermark-based authentication systems","volume":"1","author":"Fei","year":"2006","journal-title":"IEEE Trans. Inf. Forensics Secur"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1109\/MWC.2010.5601959","article-title":"Non-cryptographic authentication and identification in wireless networks","volume":"17","author":"Zeng","year":"2010","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"411","DOI":"10.1007\/3-540-39568-7_32","article-title":"Authentication theory\/coding theory","volume":"196","author":"Simmons","year":"1985","journal-title":"Advances in Cryptology"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"1355","DOI":"10.1002\/j.1538-7305.1975.tb02040.x","article-title":"The Wire-tap channel","volume":"54","author":"Wyner","year":"1975","journal-title":"Bell Syst. Tech. J."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"906","DOI":"10.1109\/TIT.2008.2009842","article-title":"Authentication over noisy channels","volume":"55","author":"Lai","year":"2009","journal-title":"IEEE Trans. Inf. Theory."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Bloch, M., and Barros, J. (2011). Physical-Layer Security, Cambridge University Press.","DOI":"10.1017\/CBO9780511977985"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"1915","DOI":"10.1109\/18.476316","article-title":"Generalized privacy amplification","volume":"41","author":"Bennett","year":"1995","journal-title":"IEEE Trans. Inf. Theory."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Preneel, B. (2000). Advances in Cryptology\u2014EUROCRYPT 2000, Springer.","DOI":"10.1007\/3-540-45539-6"},{"key":"ref_13","first-page":"48","article-title":"Almost independence and secrecy capacity","volume":"32","year":"1996","journal-title":"Probl. Peredachi Inf."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Barros, J., and Rodrigues, M.R.D. (2006, January 9\u201314). Secrecy capacity of wireless channels, Seattle, WA, USA.","DOI":"10.1109\/ISIT.2006.261613"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"2515","DOI":"10.1109\/TIT.2008.921908","article-title":"Wireless information-theoretic security","volume":"54","author":"Bloch","year":"2008","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Chrysikos, T., Dagiuklas, T., and Kotsopoulos, S. (2011). Wireless information-theoretic security in an outdoor topology with obstacles: Theoretical analysis and experimental measurements. EURASIP J. Wirel. Commun. Netw., 628\u2013747.","DOI":"10.1155\/2011\/628747"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"339","DOI":"10.1109\/TIT.1978.1055892","article-title":"Broadcast channels with confidential messages","volume":"24","author":"Korner","year":"1978","journal-title":"IEEE Trans. Inf. Theory."},{"key":"ref_18","unstructured":"Ozel, O., and Ulukus, S. (August, January 31). Wiretap channels: Roles of rate splitting and channel prefixing, St. Petersburg, FL, USA."},{"key":"ref_19","unstructured":"Ulukus, S. (, January April). Information theoretic security, Antalya, Turkey."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"2933","DOI":"10.1109\/TIT.2007.901143","article-title":"Applications of LDPC codes to the wiretap channel","volume":"53","author":"Thangaraj","year":"2007","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"532","DOI":"10.1109\/TIFS.2011.2134093","article-title":"LDPC codes for the Gaussian wiretap channel","volume":"6","author":"Klinc","year":"2011","journal-title":"IEEE Trans. Inf. Forensics Secur"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"619","DOI":"10.1109\/18.910578","article-title":"Design of capacity-approaching irregular low-density parity-check codes","volume":"47","author":"Richardson","year":"2001","journal-title":"IEEE Trans. Inf. Theory."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"6428","DOI":"10.1109\/TIT.2011.2162275","article-title":"Achieving the secrecy capacity of wiretap channels using polar codes","volume":"57","author":"Mahdavifar","year":"2011","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"585","DOI":"10.1109\/TIFS.2011.2148715","article-title":"Strong secrecy on the binary erasure wiretap channel using large-girth LDPC codes","volume":"6","author":"Subramanian","year":"2011","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Subramanian, A., Suresh, A.T., Raj, S., Thangaraj, A., Bloch, M., and McLaughlin, S. (2010, January 6\u201310). Strong and weak secrecy in wiretap channels, Brest, France.","DOI":"10.1109\/ISTC.2010.5613867"},{"key":"ref_26","unstructured":"Zhou, X.Y., Song, L.Y., and Zhang, Y. (2013). Physical Layer Security in wireless Communications, CRC Press."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1007\/BF00190800","article-title":"Information-theoretic bounds for authentication schemes","volume":"2","author":"Walker","year":"1990","journal-title":"J. Cryptol."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Stinson, D.R. (2005). Cryptography: Theory and Practice, CRC Press. [3rd ed].","DOI":"10.1201\/9781420057133"}],"container-title":["Entropy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1099-4300\/17\/1\/368\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T20:41:39Z","timestamp":1760215299000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1099-4300\/17\/1\/368"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,1,14]]},"references-count":28,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2015,1]]}},"alternative-id":["e17010368"],"URL":"https:\/\/doi.org\/10.3390\/e17010368","relation":{},"ISSN":["1099-4300"],"issn-type":[{"type":"electronic","value":"1099-4300"}],"subject":[],"published":{"date-parts":[[2015,1,14]]}}}