Zobrazeno 1 - 10
of 2 703
pro vyhledávání: '"secret key agreement"'
Autor:
Zhou, Junda, Li, Cheuk Ting
We consider a key agreement setting where two parties observe correlated random sources, and want to agree on a secret key via public discussions. In order to allow the key length to adapt to the realizations of the random sources, we allow the key t
Externí odkaz:
http://arxiv.org/abs/2405.07493
Autor:
Snoap, John A.
Physical layer approaches for generating secret encryption keys for wireless systems using channel information have attracted increased interest from researchers in recent years. This paper presents a new approach for calculating log-likelihood ratio
Externí odkaz:
http://arxiv.org/abs/2307.02391
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
We propose a novel advantage distillation strategy for physical layer-based secret-key-agreement (SKA). We consider a scenario where Alice and Bob aim at extracting a common bit sequence, which should remain secret to Eve, by quantizing a random numb
Externí odkaz:
http://arxiv.org/abs/2304.10312
In a one-way secret key agreement (OW-SKA) protocol in source model, Alice and Bob have private samples of two correlated variables X and Y that are partially leaked to Eve through Z, and use a single message from Alice to Bob to obtain a secret shar
Externí odkaz:
http://arxiv.org/abs/2302.13176
Secret-key agreement based on biometric or physical identifiers is a promising security protocol for authenticating users or devices with small chips due to its lightweight security. In previous studies, the fundamental limits of such a protocol were
Externí odkaz:
http://arxiv.org/abs/2208.10478
In this paper, we explore the connection between secret key agreement and secure omniscience within the setting of the multiterminal source model with a wiretapper who has side information. While the secret key agreement problem considers the generat
Externí odkaz:
http://arxiv.org/abs/2112.00394
While the wiretap secret key capacity remains unknown for general source models even in the two-user case, we obtained a single-letter characterization for a large class of multi-user source models with a linear wiretapper who can observe any linear
Externí odkaz:
http://arxiv.org/abs/2102.01771
Publikováno v:
In Ad Hoc Networks 1 January 2023 138
Information theoretic secret key agreement is impossible without making initial assumptions. One type of initial assumption is correlated random variables that are generated by using a noisy channel that connects the terminals. Terminals use the corr
Externí odkaz:
http://arxiv.org/abs/2008.02977