期刊文献+

密钥生成系统中的双门限量化算法研究 被引量:6

The Research of Double-threshold Quantization Algorithm in the Secret Key Generation System
下载PDF
导出
摘要 针对密钥生成系统中传统量化算法导致合法双方初始不一致率较高从而降低最终的密钥生成长度的问题,提出了双门限量化的基本模型,合法双方同时设置一个上门限和下门限,将高于上门限的采样值量化为1,低于下门限的采样值量化为0,同时将上、下门限之间的采样值舍弃。通过分析可知,这种量化方法有较高的可靠性,并且不会泄露有关密钥的任何信息。本文分析了其在密钥生成中的具体应用,并以合法双方最终生成的密钥的长度为目标函数,推导得到了双门限量化时最优的量化因子。进一步的仿真表明,相比较传统的等概量化,通过选择合适的量化因子,合法双方能够生成更长的密钥。在信噪比为15 dB-25 dB时,密钥长度的提升在0.1比特以上。 The traditional quantization methods lead high initial disagreement rate in the secret key generation courses, which would reduce the final length of secret key. The basic model of double-threshold quantization was proposed. The legitimate users set a high threshold and a low threshold at the same time. The sampled values are quantized to 1 when the values are greater than the high threshold and to 0 when the values are lower than the low threshold; the values between the two thresholds are not encoded. Through analysis, we can find that this method allows high reliability and does not reveal anything about the generated bits to the wiretapper. Its application in the secret key generation system was also analyzed in this paper, by taking the final secret key length generated by legitimate users as target function, the optimized quantization factors were deduced. The farther simulation results show that the legitimate users can generate more secret key bits by selecting appropriate quantization factors. The length of secret key is increased by 0.1 bits above when the signal to noise is between 15dB to 25dB.
出处 《信号处理》 CSCD 北大核心 2013年第6期782-787,共6页 Journal of Signal Processing
关键词 密钥生成 双门限量化 密钥长度 量化因子 secret key generation double-threshold quantization secret key length quantization factor
  • 相关文献

参考文献13

  • 1Aono T, Higuchi K, Ohira T, Komiyama B, Sasaoka H. Wireless secret key generation exploiting reactance do- main scalar response of multipath fading channels [ J ]. IEEE Transactions on Antennas and Propagation, 2005, 53( 11 ) :3776-3784.
  • 2Wilson R, Tse D, Scholtz R A. Channel identification: Secret sharing using reciprocity in UWB channels [ J ]. IEEE Transactions on Information Forensics and Security, 2007, 2(3) :364-375.
  • 3Maurer U. Secret key agreement by public discussion from common information [ J ]. IEEE Transactions on Informa- tion Theory, 1993, 39 (3) :733-742.
  • 4Brassard G, Salvail L. Secret-key reconciliation by public discussion [ J ]. Advances in Cryptology-Eurocrypt, 1994, 410-423.
  • 5Butter W T. Fast efficient error reconciliation for quantum cryptography[J]. Phys. Rev. A, 2003, 67(5):3-28.
  • 6Ye C, Reznik A, Shah Y. Extracting Secrecy from Jointly Gaussian Random Variables [ C ]. International Symposium on Information Theory, Seattle, USA, 2006:2593-2597.
  • 7Max J. Quantizing for Mimimum Distortion [ J]. IRE Transactions on Information Theory, 1960, 6( 1 ) :7-12.
  • 8邓晓曼,潘志斌,高风娟.改进的基于快速相关矢量量化的高效信息隐藏方法[J].信号处理,2012,28(8):1139-1147. 被引量:1
  • 9Hamida S,Pierrot J,Castelluccia C. An Adaptive Quanti- zation Algorithm for Secret Key Generation using Radio Channel Measurements [ C ] Proec.edings of 3'I IEEE ln- ternatinnal Conterence on New technologies, Mobility and Security, Cairo, Egypt, 2009 : 1-5.
  • 10Chan Chen, Jensen M. Secrel Key Establishment Using Temporally and Spatially Correlated Wireless Channel Co- efficiems[ J]. IEEE Transactions oll Mobile Computing, 2011:10(2) :205-215.

二级参考文献13

  • 1Chan C K, Cheng L M. Hiding data in images by simpleLSB substitution [ J ]. Pattern Recognition, 2004,37 ( 3 ) : 469- 474.
  • 2Huang H C,Chang F C,Feng W C. Reversible Data Hid- ing with Histogram-Based Difference Expansion for QR Code Applications [ J ]. IEEE Transactions on Consumer Electronics, 2011,57 ( 2 ) : 779 -787.
  • 3Lin Y C, Wang C C. Digital images watermarking by vec- tor quantization [ C ] // Proc. National Computer Symp. , Taiwan, Taipei : Feng Chia University, 1999 : 76- 87.
  • 4Jo M, Kim H. A digital image watermarking scheme based on vector quantization[J]. IEICE Trans. Inf. Syst. ,2002, E85-D, ( 6 ) : 1054-1056.
  • 5Du W C, Hsu W J. Adaptive data hiding based on VQ compressed images [ J ]. IEE Proc. , Vis. Image Signal Process..2003.150. (4) :233-238.
  • 6Yang B, Lu Z M, Sun S H. Reversible watermarking in the VQ-compressed domain [ C ]//Proceedings of the Fifth International Conference on Visualization, Imaging, and Image Processing, Calgary : ACTA Press ,2005:289-303.
  • 7Chang C C, Lin C Y. Reversible steganography for VQ- compressed images using side matching and relocation [ J ]. IEEE Transactions on Information Forensics and Se- curity,2006,1 (4) :493-501.
  • 8Chang C C, Tai W J, Lin C C. A reversible data hiding scheme based on side match vector quantization [ J ].IEEE Transactions on Circuits and Systems for Video Technology ,2006,16(10) : 1301-1308.
  • 9Chang C C, Hsieh Y P, Lin C Y. Lossless data embed- ding with high embedding capacity based on declustering for VQ-compressed codes [ J ]. IEEE Transactions on In- formation Forensics and Security,2007,2 ( 3 ) : 341-349.
  • 10Chang C C, Nguyen T S, Lin C C. A reversible data hid- ing scheme for VQ indices using locally adaptive coding [ J ]. Journal of Visual Communication and Image Repre- sentation, 2011,22 ( 7 ) : 664 - 672.

同被引文献40

  • 1高敬伯,周曼丽.规则低密度校验码的比特翻转解码算法研究[J].计算机科学,2006,33(8):76-79. 被引量:1
  • 2Ye C, Reznik A, Shah Y. Extracting secrecy from jointly Gaussian random variables[ C]//2006 IEEE International Symposium on Information Theory, Seattle, July 2006: 2593 -2597.
  • 3Ye C, Mathur S, Reznik A, et al. Information-Theoreti- cally secret key generation for fading wireless channels [ J ]. IEEE Transactions on Information Forensics and Se- curity, 2010, 5(2): 240-254.
  • 4Premnath S N, Jana S, Croft J, et al. Secret key extrac- tion from wireless signal strength in real environments [ J]. IEEE Transactions on Mobile Computing, 2013, 12 (5) :917-930.
  • 5Patwari N, Croft J, Jana S. High-rate uncorrelated bit extraction for shared secret key generation from channel measurements[ J]. IEEE Transactions on Mobile Compu- ting, 2009, 9( 1 ) : 17-30.
  • 6Chen C, Jensen A M. Secret key establishment using tem- porally and spatially correlated wireless channel coeffi- cients [ J ]. IEEE Transaction on Mobile Computing, 2011,10(2) : 205-215.
  • 7Durgin G D. Space-Time wireless channels [ M]. Prentic Hall PTR, 2002.
  • 8Rappaport T S. Wireless communications: Principles and Practice[ M]. Prentic Hall PTR, 2001.
  • 9Zheng Y R, Xiao C. Simulation models with correct statis- tical properties for rayleigh fading channels [ J ]. IEEE Transactions on Communications. 2003, 51 (6) : 920-928.
  • 10Haykin S. McMern fliers[ M]. Macmillan, New York, 1989.

引证文献6

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部