About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
10th EAI International Conference on Communications and Networking in China

Research Article

Eliminating Privacy Amplification in Secret Key Generation from Wireless Channels

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.4108/eai.15-8-2015.2260622,
        author={Zhongqiang Cao and Xiaofu Wu and Wei-ping Zhu and Jingwu Cui},
        title={Eliminating Privacy Amplification in Secret Key Generation from Wireless Channels},
        proceedings={10th EAI International Conference on Communications and Networking in China},
        publisher={IEEE},
        proceedings_a={CHINACOM},
        year={2015},
        month={9},
        keywords={secret key generation privacy amplification reconciliation karhunen-lo`eve transform},
        doi={10.4108/eai.15-8-2015.2260622}
    }
    
  • Zhongqiang Cao
    Xiaofu Wu
    Wei-ping Zhu
    Jingwu Cui
    Year: 2015
    Eliminating Privacy Amplification in Secret Key Generation from Wireless Channels
    CHINACOM
    IEEE
    DOI: 10.4108/eai.15-8-2015.2260622
Zhongqiang Cao1,*, Xiaofu Wu1, Wei-ping Zhu1, Jingwu Cui1
  • 1: Nanjing University of Posts and Telecommunications, Nanjing 210003, CHINA
*Contact email: 13010521@njupt.edu.cn

Abstract

The inherent randomness of wireless radio channels can be employed to extract secrets, whenever the channel reciprocity holds. Privacy amplification is an ingredient step for removing the redundancy of key, of which, the mount of information leaked to potential eavesdroppers, is often difficult to determine. In this paper, we propose a secret-key generation scheme without privacy amplification, of which the disagreement of key is coordinated through the reconciliation of sample positions as did in the level-crossing scheme. Compared to the level-crossing scheme, the proposed approach accumulates the reliable samples and further employs multi-bit quantization for improving the rate of secret-key generation. The accumulated samples should be decorrelated for generating random keys. Through extensive simulations, we find that the Karhunen-Lo`eve transform for decorrelation is very sensitive in implementation.

Keywords
secret key generation privacy amplification reconciliation karhunen-lo`eve transform
Published
2015-09-21
Publisher
IEEE
http://dx.doi.org/10.4108/eai.15-8-2015.2260622
Copyright © 2015–2025 IEEE
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL