From Chaos to Secret Key Agreement

被引:0
|
作者
Ando, Megumi [1 ]
机构
[1] MIT, Dept Elect Engn & Comp Sci, Cambridge, MA 02139 USA
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A chaos-based key generation scheme is proposed and its performance analyzed. The Logistic Map Scheme (LMS) is a new approach for secure communication on wireless networks. The LMS guarantees security without requiring devices to engage in computationally intensive protocols. In addition, the method's key generation process is shown to achieve a practical form of information theoretic secrecy: guaranteeing reliability from the perspective of the communication agents while displaying unpredictability and randomness to an eavesdropper.
引用
收藏
页数:5
相关论文
共 50 条
  • [31] Secret Key Agreement from Correlated Gaussian,Sources by Rate Limited Public Communication
    Watanabe, Shun
    Oohama, Yasutada
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2010, E93A (11) : 1976 - 1983
  • [32] Secret Key Agreement From Vector Gaussian Sources by Rate Limited Public Communication
    Watanabe, Shun
    Oohama, Yasutada
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (03) : 541 - 550
  • [33] Secret Key Agreement from Vector Gaussian Sources by Rate Limited Public Communication
    Watanabe, Shun
    Oohama, Yasutada
    2010 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, 2010, : 2597 - 2601
  • [34] Analysis of the information theoretically secret key agreement by public discussion
    Wang, Qiuhua
    Wang, Xiaojun
    Lv, Qiuyun
    Ye, Xueyi
    Luo, Yi
    You, Lin
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (15) : 2507 - 2523
  • [35] Secret-Key Agreement With Channel State Information at the Transmitter
    Khisti, Ashish
    Diggavi, Suhas N.
    Wornell, Gregory W.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (03) : 672 - 681
  • [36] Some results on secret key agreement using correlated sources
    Muramatsu, Jun
    Yoshimura, Kazuyuki
    Arai, Kenichi
    Davis, Peter
    NTT Technical Review, 2008, 6 (02):
  • [37] Analysis of Secret Key Agreement Protocol for Massive MIMO Systems
    Otsuka, Seiya
    Iimori, Hiroki
    Ando, Kengo
    de Abreu, Giuseppe Thadeu Freitas
    Ishibashi, Koji
    Ishikawa, Naoki
    INTERNATIONAL JOINT CONFERENCE 15TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE IN SECURITY FOR INFORMATION SYSTEMS (CISIS 2022) 13TH INTERNATIONAL CONFERENCE ON EUROPEAN TRANSNATIONAL EDUCATION (ICEUTE 2022), 2023, 532 : 86 - 94
  • [38] Secret-Key-Agreement Advantage Distillation With Quantization Correction
    Ardizzon, Francesco
    Giurisato, Francesco
    Tomasin, Stefano
    IEEE COMMUNICATIONS LETTERS, 2023, 27 (09) : 2293 - 2297
  • [39] An Optimality Summary: Secret Key Agreement with Physical Unclonable Functions
    Guenlue, Onur
    Schaefer, Rafael F.
    ENTROPY, 2021, 23 (01) : 1 - 23
  • [40] Secret Key Agreement Using Asymmetry in Channel State Knowledge
    Khisti, Ashish
    Diggavi, Suhas
    Wornell, Gregory
    2009 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, VOLS 1- 4, 2009, : 2286 - +