{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T04:25:20Z","timestamp":1760243120775,"version":"build-2065373602"},"reference-count":31,"publisher":"MDPI AG","issue":"7","license":[{"start":{"date-parts":[[2015,7,14]],"date-time":"2015-07-14T00:00:00Z","timestamp":1436832000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Entropy"],"abstract":"<jats:p>Identity authentication is the process of verifying users\u2019 validity. Unlike classical key-based authentications, which are built on noiseless channels, this paper introduces a general analysis and design framework for identity authentication over noisy channels. Specifically, the authentication scenarios of single time and multiple times are investigated. For each scenario, the lower bound on the opponent\u2019s success probability is derived, and it is smaller than the classical identity authentication\u2019s. In addition, it can remain the same, even if the secret key is reused. Remarkably, the Cartesian authentication code proves to be helpful for hiding the secret key to maximize the secrecy performance. Finally, we show a potential application of this authentication technique.<\/jats:p>","DOI":"10.3390\/e17074940","type":"journal-article","created":{"date-parts":[[2015,7,14]],"date-time":"2015-07-14T10:53:35Z","timestamp":1436871215000},"page":"4940-4958","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Identity Authentication over Noisy Channels"],"prefix":"10.3390","volume":"17","author":[{"given":"Fanfan","family":"Zheng","sequence":"first","affiliation":[{"name":"Department of Communication Engineering, Xiamen University, Xiamen 361005, China"}]},{"given":"Zhiqing","family":"Xiao","sequence":"additional","affiliation":[{"name":"Department of Electronic Engineering, Tsinghua University, Beijing 100084, China"}]},{"given":"Shidong","family":"Zhou","sequence":"additional","affiliation":[{"name":"Department of Electronic Engineering, Tsinghua University, Beijing 100084, China"},{"name":"State Key Laboratory on Microwave and Digital Communications, Tsinghua University, Beijing 100084, China"},{"name":"Tsinghua National Laboratory for Information Science and Technology, Tsinghua University, Beijing 100084, China"}]},{"given":"Jing","family":"Wang","sequence":"additional","affiliation":[{"name":"Research Institute of Information Technology, Tsinghua University, Beijing 100084, China"},{"name":"State Key Laboratory on Microwave and Digital Communications, Tsinghua University, Beijing 100084, China"},{"name":"Tsinghua National Laboratory for Information Science and Technology, Tsinghua University, Beijing 100084, China"}]},{"given":"Lianfen","family":"Huang","sequence":"additional","affiliation":[{"name":"Department of Communication Engineering, Xiamen University, Xiamen 361005, China"}]}],"member":"1968","published-online":{"date-parts":[[2015,7,14]]},"reference":[{"unstructured":"Menezes, A.J., Vanstone, S.A., and Oorschot, P.C.V. (1997). Handbook of Applied Cryptography, CRC Press.","key":"ref_1"},{"unstructured":"Yang, L. Available online: http:\/\/web2.utc.edu\/~Li-Yang\/cpsc4600\/08_Entity-Authentication14.ppt.","key":"ref_2"},{"doi-asserted-by":"crossref","unstructured":"Yu, P., Baras, J., and Sadler, B. (2009). An Implementation of Physical Layer Authentication Using Software Radio, Army Research Laboratory.","key":"ref_3","DOI":"10.21236\/ADA502531"},{"doi-asserted-by":"crossref","unstructured":"Blakley, G.R., and Chaum, D. (1985). Advances in Cryptology, Springer.","key":"ref_4","DOI":"10.1007\/3-540-39568-7"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"1350","DOI":"10.1109\/18.850674","article-title":"Authentication theory and hypothesis testing","volume":"46","author":"Maurer","year":"2000","journal-title":"IEEE Trans. Inf. Theory."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1007\/BF00198462","article-title":"A lower bound on authentication after having observed a sequence of messages","volume":"6","author":"Rosenbaum","year":"1993","journal-title":"J. Cryptol."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1109\/MWC.2010.5601959","article-title":"Non-cryptographic authentication and identification in wireless networks","volume":"17","author":"Zeng","year":"2010","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"906","DOI":"10.1109\/TIT.2008.2009842","article-title":"Authentication over noisy channels","volume":"55","author":"Lai","year":"2009","journal-title":"IEEE Trans. Inf. Theory."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"368","DOI":"10.3390\/e17010368","article-title":"Message authentication over noisy channels","volume":"17","author":"Zheng","year":"2015","journal-title":"Entropy"},{"unstructured":"Bellare, M. Available online: http:\/\/cseweb.ucsd.edu\/~mihir\/cse207\/w-mac.pdf.","key":"ref_10"},{"unstructured":"Ko\u00e7, \u00c7.K. Available online: http:\/\/cs.ucsb.edu\/~koc\/ccs130h\/notes\/mac2.pdf.","key":"ref_11"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"1355","DOI":"10.1002\/j.1538-7305.1975.tb02040.x","article-title":"The wire-tap channel","volume":"54","author":"Wyner","year":"1975","journal-title":"Bell Syst. Tech. J"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1109\/MWC.2011.5999759","article-title":"Secret key generation exploiting channel characteristics in wireless communications","volume":"18","author":"Ren","year":"2011","journal-title":"IEEE Trans. Wirel. Commun."},{"unstructured":"Chen, C., and Jensen, M.A. (September, January 28). Improved channel quantization for secret key establishment in wireless systems, Honolulu, HI, USA.","key":"ref_14"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"339","DOI":"10.1109\/TIT.1978.1055892","article-title":"Broadcast channels with confidential messages","volume":"24","author":"Korner","year":"1978","journal-title":"IEEE Trans. Inf. Theory."},{"unstructured":"Ozel, O., and Ulukus, S. (August, January 31). Wiretap channels: Roles of rate splitting and channel prefixing, St. Petersburg, Russia.","key":"ref_16"},{"doi-asserted-by":"crossref","unstructured":"Bloch, M., and Barros, J. (2011). Physical-Layer Security, Cambridge University Press.","key":"ref_17","DOI":"10.1017\/CBO9780511977985"},{"doi-asserted-by":"crossref","unstructured":"Qin, H., Chen, X., Sun, Y., Zhao, M., and Wang, J. (2011, January 5\u20139). Optimal power allocation for joint beamforming and artificial noise design in secure wireless communications, Kyoto, Japan.","key":"ref_18","DOI":"10.1109\/iccw.2011.5963524"},{"doi-asserted-by":"crossref","unstructured":"Liao, W.C., Chang, T.H., Ma, W.K., and Chi, C.Y. (2010, January 14\u201319). Joint transmit beamforming and artificial noise design for QoS discrimination inwireless downlink, Dallas, TX, USA.","key":"ref_19","DOI":"10.1109\/ICASSP.2010.5496291"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"2180","DOI":"10.1109\/TWC.2008.060848","article-title":"Guaranteeing secrecy using artificial noise","volume":"7","author":"Goel","year":"2008","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"2933","DOI":"10.1109\/TIT.2007.901143","article-title":"Applications of LDPC codes to the wiretap channel","volume":"53","author":"Thangaraj","year":"2007","journal-title":"IEEE Trans. Inf. Theory."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"532","DOI":"10.1109\/TIFS.2011.2134093","article-title":"LDPC codes for the Gaussian wiretap channel","volume":"6","author":"Klinc","year":"2011","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"619","DOI":"10.1109\/18.910578","article-title":"Design of capacity-approaching irregular low-density parity-check codes","volume":"47","author":"Richardson","year":"2001","journal-title":"IEEE Trans. Inf. Theory."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"585","DOI":"10.1109\/TIFS.2011.2148715","article-title":"Strong secrecy on the binary erasure wiretap channel using large-girth LDPC codes","volume":"6","author":"Subramanian","year":"2011","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"2229","DOI":"10.1109\/TIT.2007.896872","article-title":"A generic construction of Cartesian authentication codes","volume":"53","author":"Ding","year":"2007","journal-title":"IEEE Trans. Inf. Theory."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1142\/S1793830909000075","article-title":"A construction of Cartesian authentication code from orthogonal spaces over a finite field of odd characteristic","volume":"1","author":"Li","year":"2009","journal-title":"Discrete Math., Alg. Appl."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1016\/S0890-5401(03)00053-1","article-title":"Logarithm cartesian authentication codes","volume":"184","author":"Sze","year":"2003","journal-title":"Inf. Compu."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"1737","DOI":"10.1016\/S0304-3975(02)00077-4","article-title":"Cartesian authentication codes from functions with optimal nonlinearity","volume":"290","author":"Chanson","year":"2003","journal-title":"Theor. Comput. Sci."},{"unstructured":"Chen, G., Zhang, Y., Luan, F., and Xiao, L. (2013, January 14\u201316). Optimization of AP placement in indoor fingerprint positioning, Jeju, South Korea.","key":"ref_29"},{"key":"ref_30","first-page":"188","article-title":"Fading characteristics of wireless channel on high-speed railway in hilly terrain scenario","volume":"12","author":"Luan","year":"2013","journal-title":"Int. J. Antennas Propag."},{"key":"ref_31","first-page":"104","article-title":"Measurement-based analysis of transmit antenna selection for in-cabin distributed MIMO system","volume":"16","author":"Zhang","year":"2012","journal-title":"Int. J. Antennas Propag."}],"container-title":["Entropy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1099-4300\/17\/7\/4940\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T20:49:08Z","timestamp":1760215748000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1099-4300\/17\/7\/4940"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,7,14]]},"references-count":31,"journal-issue":{"issue":"7","published-online":{"date-parts":[[2015,7]]}},"alternative-id":["e17074940"],"URL":"https:\/\/doi.org\/10.3390\/e17074940","relation":{},"ISSN":["1099-4300"],"issn-type":[{"type":"electronic","value":"1099-4300"}],"subject":[],"published":{"date-parts":[[2015,7,14]]}}}