From Chaos to Secret Key Agreement

被引:0
|
作者
Ando, Megumi [1 ]
机构
[1] MIT, Dept Elect Engn & Comp Sci, Cambridge, MA 02139 USA
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A chaos-based key generation scheme is proposed and its performance analyzed. The Logistic Map Scheme (LMS) is a new approach for secure communication on wireless networks. The LMS guarantees security without requiring devices to engage in computationally intensive protocols. In addition, the method's key generation process is shown to achieve a practical form of information theoretic secrecy: guaranteeing reliability from the perspective of the communication agents while displaying unpredictability and randomness to an eavesdropper.
引用
收藏
页数:5
相关论文
共 50 条
  • [21] Robust authentication and key agreement scheme preserving the privacy of secret key
    Wang, Ren-Chiun
    Juang, Wen-Shenq
    Lei, Chin-Laung
    COMPUTER COMMUNICATIONS, 2011, 34 (03) : 274 - 280
  • [22] Secret Key Generation and Agreement in UWB Communication Channels
    Madiseh, Masoud Ghoreishi
    McGuire, Michael L.
    Neville, Stephen S.
    Cai, Lin
    Horie, Michael
    GLOBECOM 2008 - 2008 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2008,
  • [23] A Channel Model of Transceivers for Multiterminal Secret Key Agreement
    Poostindouz, Alireza
    Safavi-Naini, Reihaneh
    PROCEEDINGS OF 2020 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA2020), 2020, : 412 - 416
  • [24] Secret Key Agreement for Data Dissemination in Vehicular Platoons
    Li, Kai
    Lu, Lingyun
    Ni, Wei
    Tovar, Eduardo
    Guizani, Mohsen
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2019, 68 (09) : 9060 - 9073
  • [25] Universal Multiparty Data Exchange and Secret Key Agreement
    Tyagi, Himanshu
    Watanabe, Shun
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2017, 63 (07) : 4057 - 4074
  • [26] Secret Key Agreement using a Virtual Wiretap Channel
    Sharifian, Setareh
    Lin, Fuchun
    Safavi-Naini, Reihaneh
    IEEE INFOCOM 2017 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, 2017,
  • [27] Secret Key Agreement Based on Secure Polar Code
    Zhang Shengjun
    Zhong Zhou
    Jin Liang
    Huang Kaizhi
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2019, 41 (06) : 1413 - 1419
  • [28] SECRET KEY AGREEMENT: FUNDAMENTAL LIMITS AND PRACTICAL CHALLENGES
    Rezki, Zouheir
    Zorgui, Marwen
    Alomair, Basel
    Alouini, Mohamed-Slim
    IEEE WIRELESS COMMUNICATIONS, 2017, 24 (03) : 72 - 79
  • [29] AN APPLICATION OF ST-NUMBERING TO SECRET KEY AGREEMENT
    Mizuki, Takaaki
    Nakayama, Satoru
    Sone, Hideaki
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2011, 22 (05) : 1211 - 1227
  • [30] Secret Key Agreement under Discussion Rate Constraints
    Chan, Chung
    Mukherjee, Manuj
    Kashyap, Navin
    Zhou, Qiaoqiao
    2017 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2017, : 1519 - 1523