Authentication over Noisy Channels
Citations
1,294 citations
Cites background from "Authentication over Noisy Channels"
...The impact of both noise and errors in the channel was taken into account for the first time in [278]....
[...]
877 citations
Cites background from "Authentication over Noisy Channels"
...Furthermore, compared to public-key algorithms for key management in hybrid cryptosystems, the information theoretic security approaches are less vulnerable to the man-in-themiddle attack [78, 113, 114, 141, 146, 162, 171] due to the intrinsic randomness shared by terminals....
[...]
530 citations
228 citations
120 citations
Cites background from "Authentication over Noisy Channels"
...However, the presence of both noise and errors in the channel was taken into account for the first time in [5]....
[...]
References
45,034 citations
8,777 citations
"Authentication over Noisy Channels" refers background in this paper
...Transmission is said to be perfectly secure, if the signal received at the opponent does not provide it with any information aboutM ....
[...]
[...]
7,129 citations
"Authentication over Noisy Channels" refers background in this paper
...The source-wiretapper channel is said to be less noisy than the main channel, if for all possibleU that satisfy the above Markov chain relationship, one hasI(U ; Z) > I(U ; Y )....
[...]
...The first one is called animpersonation attack, in which the opponent sendsW ′ to the destination before the source sends anything....
[...]
3,570 citations
"Authentication over Noisy Channels" refers background in this paper
...We denote the success probability of this attack byPS ....
[...]
...We can see that the perfect secrecy capacity is nonzero unless th wiretapper channel is less noisy than the main channel....
[...]
2,065 citations