Secret keys from channel noise

H Ahmadi, R Safavi-Naini - Annual International Conference on the Theory …, 2011 - Springer
… secure Secret Key Establishment (SKE) when Alice and Bob are connected by two noisy
channels … This work started a long line of research that relies on channel noise for constructing …

Secure wireless communications: Secret keys through multipath

A Sayeed, A Perrig - 2008 IEEE International Conference on …, 2008 - ieeexplore.ieee.org
… where σ 2 denotes the combined variance of noise and interference, and SINR = E[|hi(k)|2
]/E[|Δhi(k)|2 ] = 1/σ 2 the signal-tointerference-and-noise-ratio in the estimate of each channel

Secret-key agreement with channel state information at the transmitter

A Khisti, SN Diggavi, GW Wornell - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
… shared secret-keys between two or more terminals based on such … the secret-key agreement
capacity over a wiretap-channel … is less noisy compared to the legitimate receiver’s channel. …

Secret key generation exploiting channel characteristics in wireless communications

K Ren, H Su, Q Wang - IEEE Wireless Communications, 2011 - ieeexplore.ieee.org
… • Secret key generation rate, which measures the efficiency of the schemes • Key bit randomness,
which measures the randomness of the generated keys … caused by noise, interference, …

Secure broadcasting using independent secret keys

RF Schaefer, A Khisti, HV Poor - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
… in the sense that we study the case of less noisy channels instead of degraded channels. …
eavesdropper all receive channel outputs of the same quality, we use the secret keys K1 and …

Secret-key generation using correlated sources and channels

A Khisti, SN Diggavi, GW Wornell - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
noisy channels. This problem is different from the secret-key generation problem, since the
secret-… that generates independent secret keys from the source and channel components is …

Public key cryptosystems with noisy secret keys

C Herder, B Fuller, M van Dijk, S Devadas - Cryptology ePrint Archive, 2017 - eprint.iacr.org
noisy sources to directly replace private keys in asymmetric cryptosystems. We propose a new
primitive called public-key cryptosystems with noisy keys. … to account for noise. This helper …

Quantum cryptography on noisy channels: quantum versus classical key-agreement protocols

N Gisin, S Wolf - Physical Review Letters, 1999 - APS
… value, providing Alice and Bob with a secret key. In principle, … rate on the raw key is a
secret-key agreement at all possible? … , both quantum and classical protocols provide secret keys. …

Automatic secret keys from reciprocal MIMO wireless channels: Measurement and analysis

JW Wallace, RK Sharma - IEEE Transactions on Information …, 2010 - ieeexplore.ieee.org
… systems exhibiting a reciprocal channel response are investigated … secret keys are analyzed
in the context of MIMO channels and … Due to noise or synchronization error, the nodes have …

Secret key generation using chaotic signals over frequency selective fading channels

MF Haroun, TA Gulliver - IEEE Transactions on Information …, 2015 - ieeexplore.ieee.org
channel can be done in several ways. The RSS was the first parameter used to extract secret
keys … in this section will occur due to noise, channel differences, frequency offset, timing …