The essence of authentication is the transmission of unique and irreproducible information. In this paper, the authentication becomes a problem of the secure transmission of the secret key over noisy channels. A general analysis and design framework for message authentication is presented based on the results of Wyner's wiretap channel. Impersonation and substitution attacks are primarily investigated. Information-theoretic lower and upper bounds on the opponent's success probability are derived, and the lower bound and the upper bound are shown to match. In general, the fundamental limits on message authentication over noisy channels are fully characterized. Analysis results demonstrate that introducing noisy channels is a reliable way to enhance the security of authentication.
Recovery and repair schemes are proposed for shift-exclusive-or (shift-XOR) product-matrix (PM) regenerating codes, which outperform those of the existing PM codes in terms of both communication and computation costs.In particular, for the minimum bandwidth regenerating (MBR) codes, our recovery and repair schemes have the optimal transmission bandwidth, zero decoding auxiliary data space and lower time complexity; for the minimum storage regenerating (MSR) codes, our recovery and repair schemes have smaller transmission bandwidth, smaller decoding auxiliary data space and lower time complexity. Moreover, our schemes involve only XOR operations in recovery and repair and are practical for system implementation. Technically, a procedure is first proposed for solving a system of shift-XOR equations, which plays a similar fundamental role as Gaussian elimination for solving systems of linear equations, and is of independent interest. The recovery and repair of shift-XOR MBR/MSR codes are then decomposed into a sequence of systems of shift-XOR equations, and hence can be solved by a sequence of calls to the procedure for solving a system of shift-XOR equations. As the decomposition of the recovery and repair depends only on the PM construction, but not the specific shift and XOR operations, our recovery and repair schemes can be extended to other MBR/MSR codes using the PM construction.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.