Vector Quantization and Clustered Key Mapping for Channel-Based Secret Key Generation

被引:25
作者
Hong, Y. -W. Peter [1 ]
Huang, Lin-Ming [1 ]
Li, Hou-Tung [1 ]
机构
[1] Natl Tsing Hua Univ, Inst Commun Engn, Hsinchu 30013, Taiwan
关键词
Secret key generation; vector quantization; channel estimation; secrecy; binning; AGREEMENT; INFORMATION; RANDOMNESS;
D O I
10.1109/TIFS.2017.2656459
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper proposes a vector-quantization-based secret key generation (SKG) procedure to efficiently extract shared secret keys from correlated channel observations at two communicating terminals, Alice and Bob. Most existing SKG schemes utilize scalar quantization to extract secret key bits separately from each individual channel observation. This approach is simple to implement but yields higher key disagreement probability (or lower key entropy) compared with vector-quantization-based approaches. However, regardless of the quantizer design, quantization for SKG often suffers from the so-called cell-boundary problem, which occurs when the channel observations at Alice and Bob lie close to the quantization cell boundaries, resulting in high probability of key disagreement. In this paper, a general SKG procedure that utilizes sample and quantizer selection techniques to avoid this problem is first proposed. The vector quantizer adopted in the above procedure is designed by minimizing the quadratic distortion between the true channel vector and the noisy observation at Alice (or Bob). Then, by considering the case where the eavesdropper (Eve) may observe a channel vector that is correlated with that observed by Alice and Bob, a clustered key mapping scheme that assigns each secret key to multiple quantization cells in different clusters is also proposed to induce additional randomness at Eve and, thus, maintain high conditional key entropy. The effectiveness of the proposed schemes is demonstrated through computer simulations.
引用
收藏
页码:1170 / 1181
页数:12
相关论文
共 42 条
  • [1] Aggarwal D, 2016, IEEE INT SYMP INFO, P2913, DOI 10.1109/ISIT.2016.7541832
  • [2] COMMON RANDOMNESS IN INFORMATION-THEORY AND CRYPTOGRAPHY .1. SECRET SHARING
    AHLSWEDE, R
    CSISZAR, I
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1993, 39 (04) : 1121 - 1132
  • [3] A survey of peer-to-peer content distribution technologies
    Androutsellis-Theotokis, S
    Spinellis, D
    [J]. ACM COMPUTING SURVEYS, 2004, 36 (04) : 335 - 371
  • [4] [Anonymous], 2012, VECTOR QUANTIZATION
  • [5] [Anonymous], 2012, MATH PROB ENG
  • [6] A Survey on Device-to-Device Communication in Cellular Networks
    Asadi, Arash
    Wang, Qing
    Mancuso, Vincenzo
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (04): : 1801 - 1819
  • [7] Robust Key Generation from Signal Envelopes in Wireless Networks
    Azimi-Sadjadi, Babak
    Kiayias, Aggelos
    Mercado, Alejandra
    Yener, Bulent
    [J]. CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2007, : 401 - +
  • [8] Generalized privacy amplification
    Bennett, CH
    Brassard, G
    Crepeau, C
    Maurer, UM
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1995, 41 (06) : 1915 - 1923
  • [9] LDPC-based Gaussian key reconciliation
    Bloch, Matthieu
    Thangaraj, Andrew
    McLaughlin, Steven W.
    Merolla, Jean-Marc
    [J]. 2006 IEEE INFORMATION THEORY WORKSHOP, 2006, : 116 - +
  • [10] Brassard G., 1994, LECT NOTES COMPUTER, V765, P410, DOI [10.1007/3-540-48285-7_35, DOI 10.1007/3-540-48285-7_35]