10th EAI International Conference on Communications and Networking in China

Research Article

Eliminating Privacy Amplification in Secret Key Generation from Wireless Channels

  • @INPROCEEDINGS{10.4108/eai.15-8-2015.2260622,
        author={Zhongqiang Cao and Xiaofu Wu and Wei-ping Zhu and Jingwu Cui},
        title={Eliminating Privacy Amplification in Secret Key Generation from Wireless Channels},
        proceedings={10th EAI International Conference on Communications and Networking in China},
        publisher={IEEE},
        proceedings_a={CHINACOM},
        year={2015},
        month={9},
        keywords={secret key generation privacy amplification reconciliation karhunen-lo`eve transform},
        doi={10.4108/eai.15-8-2015.2260622}
    }
    
  • Zhongqiang Cao
    Xiaofu Wu
    Wei-ping Zhu
    Jingwu Cui
    Year: 2015
    Eliminating Privacy Amplification in Secret Key Generation from Wireless Channels
    CHINACOM
    IEEE
    DOI: 10.4108/eai.15-8-2015.2260622
Zhongqiang Cao1,*, Xiaofu Wu1, Wei-ping Zhu1, Jingwu Cui1
  • 1: Nanjing University of Posts and Telecommunications, Nanjing 210003, CHINA
*Contact email: 13010521@njupt.edu.cn

Abstract

The inherent randomness of wireless radio channels can be employed to extract secrets, whenever the channel reciprocity holds. Privacy amplification is an ingredient step for removing the redundancy of key, of which, the mount of information leaked to potential eavesdroppers, is often difficult to determine. In this paper, we propose a secret-key generation scheme without privacy amplification, of which the disagreement of key is coordinated through the reconciliation of sample positions as did in the level-crossing scheme. Compared to the level-crossing scheme, the proposed approach accumulates the reliable samples and further employs multi-bit quantization for improving the rate of secret-key generation. The accumulated samples should be decorrelated for generating random keys. Through extensive simulations, we find that the Karhunen-Lo`eve transform for decorrelation is very sensitive in implementation.