memoryless channel (DMC) W 1 from sender Alice to receiver Bob and a DMC W 2 from
adversary Oscar to Bob. In addition, there is an insecure noiseless channel between Alice
and Bob. Under this model, we characterize the condition under which an authentication
from Alice to Bob is possible. We also construct a secure authentication protocol that has an
authentication rate approaching infinity. Finally, we prove that the authentication capacity of …