期刊文献+

Cascade密钥协商的改进方案 被引量:1

An Improved Scheme of Cascade Protocol
下载PDF
导出
摘要 随着移动互联网业务的快速发展,无线通信安全已成为一个重要课题。近年来,无线密钥提取技术引起了研究者们的关注,通过无线密钥提取技术促使合法通信双方拥有大量的共享密钥,结合一次一密机制,使实现信息论意义上的绝对安全成为可能。密钥协商是提取物理层密钥的关键步骤。在众多的密钥协商方案中,Cascade协商方案由于能够高效地协商出一致的密钥而备受关注。然而,Cascade协商采用二分法进行纠错,在纠错的过程中需要通信双方不断交互校验信息,从而导致Cascade对网络延迟较为敏感。为了降低Cascade协商的交互次数,提出Cascade的一种改进方案,利用截止二分搜索方案进行密钥协商。实验仿真结果表明:所提方案可以在保证密钥协商效率的同时,有效降低了通信双方的交互次数。 With the rapid development of mobile Interact services, information security for wireless communication is becoming a very important research topic. Recently, there has been great interest in generating the shared secret key based on the physical layer security techniques, which could achieve the perfect secrecy combined with a one-time pad. Information reconciliation is a key step of secret key generation. Cascade is the most famous reconciliation protocol duo to the high efficiency. However, Cascade is highly interactive protocol which makes it very sensitive to network latencies. In order to reduce the number of communications, a modifying strategy of Cascade is proposed by Abort-BINARY searching. Extensive simulation results show that the modifying strategy could ensure high efficiency of information reconciliation and reduce the number of effectively.
出处 《计算机技术与发展》 2016年第11期97-100,共4页 Computer Technology and Development
基金 国家自然科学基金资助项目(61372123)
关键词 物理层安全 Cascade协商 交互次数 效率 physical layer security Cascade number of communications efficiency
  • 相关文献

参考文献16

  • 1Hao Z, Zhong S, Li L. Towards wireless security without com- putational assumptions-an oblivious transfer protocol based on an unauthenticated wireless channel [ C ]//Proceedings of IEEE. Shanghai:IEEE,2011:2156-2164.
  • 2李古月,胡爱群,石乐.无线信道的密钥生成方法[J].密码学报,2014,1(3):211-224. 被引量:18
  • 3Maurer U. Secret key agreement by public discussion from common information [ J ]. IEEE Transactions on Information Theory, 1993,39 ( 3 ) :733 -742.
  • 4Cachin C, Maurer U. Linking information reconciliation and privacy amplification [ J ]. Journal of Cryptology, 1997,10(2) : 97-110.
  • 5Ye C X, Mathur S, Reznik A, et al. Information- theoretically secret key generation for fading wireless channels [ J ]. IEEE Transactions on Information Forensics and Security, 2010,5 (2) :240-254.
  • 6Brassard G,Salvail L. Secret key reconciliation by public dis- cussion[ C ]//Workshop on the theory and application of cryp- tographic techniques. [ s. 1. ] :[ s. n. ], 1994:410-423.
  • 7Premnath S N,Jana S,Croft J,et al. Secret key extraction from wireless signal strength in real environments[ J]. IEEE Trans- actions on Mobile Computing,2013,12(5 ) :917-930.
  • 8Bennett C, Bessette G, Salvail L, et al. Experimental quantum cryptography [ J ]. Journal of Cryptology, 1992,5 ( 1 ) :3-28.
  • 9徐津,温巧燕,王大印.一种基于Hash函数和分组密码的消息认证码[J].计算机学报,2015,38(4):793-803. 被引量:12
  • 10王张宜,李波,张焕国.Hash函数的安全性研究[J].计算机工程与应用,2005,41(12):18-19. 被引量:26

二级参考文献46

共引文献53

同被引文献7

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部