Secret Key Generation for Minimally Connected Hypergraphical Sources
نویسندگان
چکیده
منابع مشابه
Secret key generation from Gaussian sources using lattices
We propose a simple lattice-based scheme for secret key generation from Gaussian sources in the presence of an eavesdropper, and show that we achieve strong secret key rates up to 1/2 nat from the optimal in the case of degraded source models. Our scheme is based on the notion of flatness factor, and does not require dithering.
متن کاملSecret Key Generation for Fading Wireless Channel
The multipath-rich wireless atmosphere allied with typical wireless usage scenarios is characterized by a vanishing channel retort that is time-varying, location-sensitive, and only shared by a given transmitter–receiver pair. The complexity allied with a highly scattering atmosphere implies that the short-term vanishing process is intrinsically hard to envisage and best modeled stochastically,...
متن کاملSecret Key Generation by Virtual Link Estimation
In recent years, researchers have explored using unique radio propagation characteristics between two devices for extracting symmetric keys. However, the state-of-the-art has the following limitations: (i) paying more attention to only when the two devices are in communication range, and (ii) generating keys only when the devices are in motion. Secret key generation for devices which are not in...
متن کاملTemperature-Based Physical Unclonable Function for Secret Key Generation
Because the PUF taps into the random variation during an IC fabrication process, the secret is extremely difficult to predict or extract and thus in terms of five following characteristics they are more powerful than RFIDs: 1) Unpredictability 2) Resiliency against reverse engineering 3) Stability against voltage variations 4) stability against imperfection of arbiters 5) Resiliency against dig...
متن کاملLattice Codes for Secure Communication and Secret Key Generation
In this work, we study two problems in information-theoretic security. Firstly, we study a wireless network where two nodes want to securely exchange messages via an honestbut-curious bidirectional relay. There is no direct link between the user nodes, and all communication must take place through the relay. The relay behaves like a passive eavesdropper, but otherwise follows the protocol it is...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Information Theory
سال: 2020
ISSN: 0018-9448,1557-9654
DOI: 10.1109/tit.2020.2971215