CN103825725B - A kind of efficient random physical layer key generation method based on vector quantization - Google Patents

A kind of efficient random physical layer key generation method based on vector quantization Download PDF

Info

Publication number
CN103825725B
CN103825725B CN201410066595.0A CN201410066595A CN103825725B CN 103825725 B CN103825725 B CN 103825725B CN 201410066595 A CN201410066595 A CN 201410066595A CN 103825725 B CN103825725 B CN 103825725B
Authority
CN
China
Prior art keywords
bit stream
rss
wireless communication
array
vector quantization
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201410066595.0A
Other languages
Chinese (zh)
Other versions
CN103825725A (en
Inventor
李兴华
杨丹
李鑫
姚青松
马建峰
毛立强
高胜
姜奇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xidian University
Original Assignee
Xidian University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xidian University filed Critical Xidian University
Priority to CN201410066595.0A priority Critical patent/CN103825725B/en
Publication of CN103825725A publication Critical patent/CN103825725A/en
Application granted granted Critical
Publication of CN103825725B publication Critical patent/CN103825725B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)
  • Compression, Expansion, Code Conversion, And Decoders (AREA)

Abstract

The invention discloses a kind of efficient random physical layer key generation method based on vector quantization.According to the present invention, the wireless communication both sides simultaneously RSS information of detection wireless channel be transferred to the other side respectively, wireless communication both sides take discordance removal, vector quantization and fuzzy extraction step to operate simultaneously, finally give identical bit stream and use as encryption key.The bit production rate of the present invention can reach 284%, can be that under wireless network environment, the authentication encryption algorithm of communicating pair quickly provides random bit stream as encryption key;Communicating pair can reach zero bit error rate, it is ensured that communicating pair is reliably produce on all four bit stream as encryption key, it is ensured that present invention stability during using;The bit stream that the present invention produces can pass through NIST Randomness test, can produce random bit stream as key, it is ensured that the secure communication of communicating pair.

Description

A kind of efficient random physical layer key generation method based on vector quantization
Technical field
This invention belongs to wireless network secure field, relates to one and is efficiently randomly generated for cryptographic algorithm from physical layer The method of safe key and relevant apparatus.In general, can to meet wireless network secure field close to safety in this invention The generation speed of key and the requirement of security intensity.
Background technology
Various wireless devices have become as a part indispensable in our daily life, by these equipment We can carry out information sharing and data exchange.Such as, one group of visitor needs to be shared picture by point-to-point connection, regarded The resources such as frequency, prevent others to access these resources simultaneously again.In order to enable to dispose and use these to apply safely, it is ensured that number Just it is particularly important according to confidentiality, integrity and the authentication property of transmission.
The broadcast characteristic of wireless network makes it face the safety problem bigger than cable network, and assailant can be easier Eavesdropping or the Content of Communication of intercepting legitimate node, wireless device can be modified or counterfeiting to carry out some malicious acts.
Existing wireless encryption system also exists many weak points in some scene, specific as follows:
(1) existing 802.11 safe practices are that Frame provides certification and privacy mechanism, but manage frame and control frame It is not protected.
(2) theoretical basis of existing security system is that mathematical difficult problem is (such as Large integer factoring problem and discrete right Number computational problem).Along with the appearance of the development of computing technique, particularly quantum computer, the computing capability of assailant significantly carries Rising, the safety of these cryptographic techniques based on computational complexity will reduce.
(3) most cryptographic technique, particularly public key cryptography have higher complexity and calculate requirement, so being not suitable for It is applied in the low distributed wireless networks joined.
(4) traditional security mechanism based on shared key needs key management, distributes, updates and safeguard, along with node The increase of number, required key number exponentially increases, and key distribution and the workload updated can be the biggest.And at Ad hoc In network, node frequently joins and departs from network, and this makes key management more difficult.
Based on above reason, introducing safety of physical layer strengthens the scheme of wireless network secure and receives increasing pass Note.Physical layer key is based on Information theoretical secure, and it can reduce the difficulty of encryption key distribution and renewal, it is achieved layer security, Improve the safety of existing key code system.
The scheme producing key from physical layer needs based on physical layer channel information.These information include arriving angle Degree, phase place, received signal strength (RSS), channel impulse response (CIR), signal envelope and cross-point etc..Wherein, receive Signal intensity (RSS) is the common method generating key, this is because RSS directly can be obtained by existing network interface card.
In general, the standard weighing physical layer key generation method good and bad includes following three kinds:
(1) bit production rate: the key bit number that single RSS ultimately generates;
(2) the key bit error rate: communicating pair generates in key and do not mates the figure place of key and the ratio of key total length;
(3) key randomness: generate the uniformity coefficient of 0 and 1 distribution in the binary stream of key.
Currently, all there is identical problem in the physical layer key generation method that wireless network secure field exists, i.e. these Method all can not meet higher bit production rate, low error rate, the requirement of high randomness simultaneously.They mostly sacrifice bit production rate To reduce the bit error rate, and the key generation method of poor efficiency causes node to need to consume big energy carrying out repeatedly sounding channel to produce The key of raw sufficient length.
Summary of the invention
In view of the deficiencies in the prior art, it is desirable to provide a kind of efficient random physical layer key based on vector quantization Production method, produces random bit stream rapidly and provides reliable key for communicating pair encryption and certification under wireless environment.
To achieve these goals, the technical solution used in the present invention is as follows:
A kind of efficient random physical layer key generation method based on vector quantization, wireless communication both sides are respectively The RSS information of detection wireless channel be transferred to the other side simultaneously, wireless communication both sides take discordance to go simultaneously Remove, vector quantization and fuzzy extraction step operate, and finally give identical bit stream and use as encryption key.
Described method comprises the steps:
Step 1, discordance are removed: remove the inconsistent channel letter caused due to transmission channel half-duplex or ambient noise Breath;
Step 2, vector quantization: RSS is divided into two intervals according to average line, finally discontinuous RSS value is converted It it is 0,1 bit stream;
Step 3, fuzzy extraction: wireless communication both sides utilize Fuzzy extractor to generating position inconsistent in bit stream Carry out error correction and export identical bit stream as encryption key.
Further, discordance removal stage (step 1) comprises the steps:
Step 1.1, input: RSS array X={x collected1,x2,…,xk, xi∈Z;
Step 1.2, piecemeal: RSS value is carried out piecemeal, be referred to as block by block, and k RSS value is different by belonging to In block, make a length of b of each block, it is assumed that total t block;
Step 1.3, use label function R (xi) RSS value is quantified, the RSS value not being quantized is abandoned;
Step 1.4, definition m are improvement factor, and wireless communication Party A generates 0,1 sequence according to label function, runs into Continuously m position identical 0 or 1, then by the sequence number record of interposition at La_to_bIn array, generate La_to_b={ l1,l2,…,la, And it is sent to wireless communication Party B;
Step 1.5, wireless communication Party B according to label function generate 0,1 sequence, run into continuous m position identical 0 or 1, then by the sequence number record of interposition at Lb_to_aIn array, and and La_to_bArray contrasts, and rejects inconsistent sequence number, raw The L of Cheng Xinb_to_aArray is also sent to wireless communication Party A.
It should be noted that described label function R (xi) it is:
Wherein, with reference to boundary array it is Q + = { q 1 + , q 2 + , . . . , q t + } With Q - = { q 1 - , q 2 - , . . . , q t - } , q i + = mean i + α * std _ derivation i , q i - = mean i - α * std _ derivation i , meaniFor the RSS meansigma methods of i-th block, α be fluctuate because of Son and α ∈ (0,1), std_derivationiIt it is the RSS standard deviation of i-th block.
Further, vector quantization stage (step 2) comprises the steps:
Step 2.1, input through discordance remove after effective RSS array Y and the dimension N of vector quantization;
Step 2.2, for each y in array YiAll set up N-dimensional vector;
Step 2.3, to each yiAll apply N-dimensional vector quantizer QN(yi), will quantify after produce 0,1 bit stream as Output.
It should be noted that RSS array Y in described step 2.1 is: Y={y1,y2,…,yd, yiIn ∈ Z, Y array RSS value be Lb_to_aRSS value corresponding to each sequence number in array.
It should be noted that described step 2.2 is yiThe N-dimensional vector set up is:
< y i , y ( i + &Delta; 1 ) mod d , y ( i + &Delta; 1 + &Delta; 2 ) mod d , . . . , y ( i + &Delta; 1 + . . . + &Delta; N - 1 ) mod d > Wherein, Δ={ Δ12,…,ΔN-1It it is N-dimensional The component interval of N number of component, Δ in vectorjIt it is the sequence number interval between jth component and+1 component of jth.
Need it is further noted that N-dimensional vector quantizer Q in described step 2.3N(yi) it is:
Q N ( y i ) = R ( y i ) R ( y ( i + &Delta; 1 ) mod d ) . . . R ( y ( i + &Delta; 1 + . . . + &Delta; N - 1 ) mod d ) , Wherein, yiRSS for the input of N-dimensional vector quantizer Value.
In fuzzy extraction process (step 3), Fuzzy extractor can be defined as:<Gen, Rep>, parameter be (M, l, t), its In, process Gen is that probability generates process, and process Rep is definitiveness recovery process, and M is incoming bit stream set, and l is input ratio Special stream length, t is that the ultimate range between the message of wireless communication Party A and wireless communication Party B input limits.
First described process Gen is operated by wireless communication Party A, then passes to wireless by parameter P of output Network service Party B, wireless communication Party B operates according still further to process Rep, wireless communication Party A and wireless communication Party B produces on all four random secret information R as encryption key.
Process Gen is: (R, P) ← Gen (w0), wherein, input parameter w0For the bit stream of a length of l, output parameter R is The random secret information of a length of l, output parameter P is public information.
Process Rep is: R ← Rep (w', P), and wherein, input parameter w' is a length of l and and w0Distance be not more than t's Bit stream, input parameter P be process Gen generate the public information for error correction, output parameter R be a length of l with Gen mistake The random secret information of Cheng Xiangtong.
It should be noted that process Gen can preferentially be adopted realization with the following method but is not limited to following method: utilize Bose-Chaudhuri Hocquenghem error correction codes is to w0Just error correction, the error correcting code of generation, as P, utilizes SHA-1 algorithm to w0Carry out Hash process, Hash defeated Enter with output length ratio for 1:1, generate the strong key of randomness as R.
It should be noted that process Rep can preferentially be adopted realization with the following method but is not limited to following method: utilize The error correction sequence P produced during Bose-Chaudhuri Hocquenghem error correction codes and Gen carries out error correction to w', recovers w0Sequence, utilizes SHA-1 algorithm to w0 Carrying out Hash process, the input of Hash and output length ratio for 1:1, generate the strong key of randomness as R.
The present invention has the beneficial effects that:
(1) the bit production rate of the present invention can reach 284%, and average each RSS value can produce 2.84 bits, Can be that under wireless network environment, the authentication encryption algorithm of communicating pair quickly provides random bit stream as encryption key;
(2) present invention is in the application, and communicating pair can reach zero bit error rate, it is ensured that communicating pair is reliably produce On all four bit stream is as encryption key, it is ensured that present invention stability during using;
(3) bit stream that the present invention produces has passed through NIST Randomness test, can be that authentication encryption algorithm provides random Bit stream as encryption key, it is ensured that the secure communication of communicating pair.
Accompanying drawing explanation
Fig. 1 is the schematic flow sheet of the present invention;
Fig. 2 is that two-dimensional vector quantifies schematic diagram;
Fig. 3 is the organigram of Fuzzy extractor.
Detailed description of the invention
Below in conjunction with drawings and Examples, the invention will be further described.
As it is shown in figure 1, the present invention is Replication Approach in Mobile Environment, efficient random physical layer key based on vector quantization produces Method, wireless communication both sides Alice and the Bob simultaneously RSS information of detection wireless channel be transferred to the other side, both sides respectively Take this method to operate simultaneously, finally give identical bit stream and use as encryption key.
Described method comprises the steps:
Step 1, discordance are removed: remove the inconsistent channel letter caused due to transmission channel half-duplex or ambient noise Breath;
Step 2, vector quantization: RSS is divided into two intervals according to average line, finally discontinuous RSS value is converted It it is 0,1 bit stream;
Step 3, fuzzy extract: both sides utilize Fuzzy extractor to carry out error correction defeated to generating inconsistent position in bit stream Go out identical bit stream as encryption key.
Further, discordance removal stage (step 1) comprises the steps:
Step 1.1, input: RSS array X={x collected1,x2,…,xk, xi∈Z;
Step 1.2, piecemeal: RSS value is carried out piecemeal, be referred to as block by block, and k RSS value is different by belonging to In block, make a length of b of each block, it is assumed that total t block;
Step 1.3, use label function R (xi) RSS value is quantified, the RSS value not being quantized is abandoned;
Step 1.4, definition m are improvement factor, and Alice generates 0,1 sequence according to label function, runs into continuous m position identical 0 or 1, then by the sequence number record of interposition at La_to_bIn array, generate La_to_b={ l1,l2,…,la, and it is sent to Bob;
Step 1.5, Bob generate 0,1 sequence according to label function, and run into that continuous m position is identical 0 or 1, then by interposition Sequence number record is at Lb_to_aIn array, and and La_to_bArray contrasts, and rejects inconsistent sequence number, generates new Lb_to_aNumber Group is also sent to Alice.
It should be noted that described label function R (xi) it is:
Wherein, with reference to boundary array it is Q + = { q 1 + , q 2 + , . . . , q t + } With Q - = { q 1 - , q 2 - , . . . , q t - } , q i + = mean i + &alpha; * std _ derivation i , q i - = mean i - &alpha; * std _ derivation i , meaniFor the RSS meansigma methods of i-th block, α be fluctuate because of Son and α ∈ (0,1), std_derivationiIt it is the RSS standard deviation of i-th block.
Further, vector quantization stage (step 2) comprises the steps:
Step 2.1, input through discordance remove after effective RSS array Y and the dimension N of vector quantization;
Step 2.2, for each y in array YiAll set up N-dimensional vector;
Step 2.3, to each yiAll apply N-dimensional vector quantizer QN(yi), will quantify after produce 0,1 bit stream as Output.
It should be noted that RSS array Y in described step 2.1 is: Y={y1,y2,…,yd, yiIn ∈ Z, Y array RSS value be Lb_to_aRSS value corresponding to each sequence number in array.
It should be noted that described step 2.2 is each yiThe N-dimensional vector set up is: < y i , y ( i + &Delta; 1 ) mod d , y ( i + &Delta; 1 + &Delta; 2 ) mod d , . . . , y ( i + &Delta; 1 + . . . + &Delta; N - 1 ) mod d > Wherein, Δ={ Δ12,…,ΔN-1It is in N-dimensional vector The component interval of N number of component, ΔjIt it is the sequence number interval between jth component and+1 component of jth.
Need it is further noted that N-dimensional vector quantizer Q in described step 2.3N(yi) it is: Q N ( y i ) = R ( y i ) R ( y ( i + &Delta; 1 ) mod d ) . . . R ( y ( i + &Delta; 1 + . . . + &Delta; N - 1 ) mod d ) , Wherein, yiRSS value for the input of N-dimensional vector quantizer.
Two-dimensional vector quantifies as in figure 2 it is shown, work as and input as yiTime, with ΔiSecond component is found backward for intervalComposition two-dimensional vectorAnd calculate label function-output R (y according to the two componenti) andThis label output valve of twoIt is 01,01 to be yiTwo-dimensional vector quantify defeated Go out.
As it is shown on figure 3, in fuzzy extraction process (step 3), Fuzzy extractor can be defined as:<Gen, Rep>, and parameter is (M, l, t), wherein, process Gen is that probability generates process, and process Rep is definitiveness recovery process, and M is incoming bit stream set, L is incoming bit stream length, t be Alice and Bob input message between ultimate range limit.
First described process Gen is operated by Alice, then the parameter of output is passed to Bob, and Bob is according still further to mistake Journey Rep operates, Alice and Bob produces on all four random secret information R as encryption key.
Process Gen is: (R, P) ← Gen (w0), wherein, input parameter w0For the bit stream of a length of l, output parameter R is The random secret information of a length of l, output parameter P is public information.
Process Rep is: R ← Rep (w', P), and wherein, input parameter w' is a length of l and and w0Distance be not more than t's Bit stream, input parameter P be Gen process generate the public information for error correction, output parameter R be a length of l with Gen mistake The random secret information of Cheng Xiangtong.
Embodiment
In the present embodiment, communicating pair Alice and Bob is separately operable on two PC, and the operating system of lift-launch is Ubuntu12.04, uses the network interface card Atheros TL-WN650G of same model, Madwifi drives, be operated in 802.11g Transmitting-receiving bag under pattern.In this implementation process, Madwifi is modified by we, with the addition of the reply to beacon frame, Beacon_ack frame carries the serial number identical with beacon frame, and by the coupling of serial number, communicating pair can complete RSS's Pairing, a length of 49 bytes of beacon_ack.Bob moves back and forth around Alice and sends out to Alice for interval with 100ms Sending beacon frame, Alice can record serial number and corresponding RSS value after receiving beacon frame, and sends one to Bob at once The acknowledgement frame of beacon_ack.After Bob receives acknowledgement frame, record serial number and corresponding RSS value equally.At the present embodiment In, have collected 120000 RSS altogether.
Step one, discordance is removed.
Due to Alice and Bob measure RSS value time there will be some errors, the fluctuating margin of both sides the most always as, So RSS piecemeal is processed, calculate for each piece and quantify bound, the RSS of Alice with Bob in each piece can be made similar Du Genggao, thus reduce the bit error rate.In the present embodiment, the size block value of RSS sequence piecemeal is 80.
Fluctuation factor-alpha is the important factor in order reducing the bit error rate, α the biggest (little), with reference to boundary Q+And Q-Range averaging line Distance the most remote (closely), there is the probability the highest (low) that the point of little deviation is disallowable, the bit error rate can decline (rising), but with Time two with reference to the point being rejected the most (lack) between boundaries, bit production rate decline (rising) can be caused.In this reality Executing in example, α value is 0.2.
Improvement factor m is the biggest, meets continuous m position and is both greater than Q+Or less than Q-Point the fewest, consult generate effective RSS value The fewest, so can significantly reduce along with m increases bit production rate, and m increases the feelings meaning the RSS significantly saltus step of continuous m position Condition reduces, so the bit error rate can decline accordingly;Otherwise, m reduces then effective RSS number and can be greatly increased, and bit production rate increases Adding, and the situation of m position significantly saltus step continuously increases, the bit error rate reduces, and in the present embodiment, m value is 2.
Step 2, vector quantization.
N-dimensional vector quantization represents the output of the input correspondence N number of bit of generation of an effective RSS, so the biggest bit of N Exporting the longest, the bit stream being available for generating key is the biggest, finally makes bit production rate increase.But N means the most greatly bit The increased number reused, the independence between bit reduces, and randomness weakens.In the present embodiment, Δ is chosen12=...= ΔN-1=60, the distribution ratio that vector corresponding for the most each RSS is mapped on N-dimensional solid axes is more uniform, in addition the choosing of Δ Take and bit production rate and the bit error rate are not the most affected.
Step 3, fuzzy extraction.
In the present embodiment, the process carrying out fuzzy extraction is as follows:
(1) Alice generates bit stream w by vector quantization0, as the input of Gen, by BCH (23,12) Error Correction of Coding Generate error correction sequence P, and to w0Carrying out SHA-1 Hash and generate the key that randomness is strong, the input of Hash with output length ratio is 1:1。
(2) Alice error correction sequence P is sent to Bob, Bob use P to oneself quantify generate bit stream w' entangle Mistake, recovers w0Sequence, carries out SHA-1 Hash the most equally and generates identical random key.
BCH (23, the 12) true form a length of 12 chosen in this process, error correction code length is 11, and its minimum distance is 7,3 mistakes can be corrected.Bit stream is divided into every 12 one group by us, generates 11 corresponding error correcting codes and is sent to communication The other side, these 11 error correcting codes can at most correct 3 bit-errors in 12 true forms.After BCH code error correction, Alice and Bob generates Key completely the same, there is not any error bit, reach zero bit error rate.
For a person skilled in the art, can technical scheme as described above and design, make other each Kind corresponding change and deformation, and all these changes and deformation all should be at the protection domain of the claims in the present invention Within.

Claims (7)

1. an efficient random physical layer key generation method based on vector quantization, it is characterised in that:
The wireless communication both sides simultaneously RSS information of detection wireless channel be transferred to the other side respectively, wireless network leads to Letter both sides take discordance removal, vector quantization and fuzzy extraction step to operate simultaneously, finally give identical Bit stream uses as encryption key;
Described method comprises the steps:
Step 1, discordance are removed: remove the inconsistent channel information caused due to transmission channel half-duplex or ambient noise; Described step 1 comprises the steps:
Step 1.1, input: RSS array X={x collected1,x2,…,xk},xi∈Z;
Step 1.2, piecemeal: RSS value is carried out piecemeal, be referred to as block by block, and k RSS value will belong in different block, Make a length of b of each block, it is assumed that total t block;
Step 1.3, use label function R (xi) RSS value is quantified, the RSS value not being quantized is abandoned;
Step 1.4, definition m are improvement factor, and wireless communication Party A generates 0,1 sequence according to label function, runs into continuous m Position identical 0 or 1, then by the sequence number record of interposition at La_to_bIn array, generate La_to_b={ l1,l2,…,la, and send To wireless communication Party B;
Step 1.5, wireless communication Party B generate 0,1 sequence according to label function, run into that continuous m position is identical 0 or 1, then By the sequence number record of interposition at Lb_to_aIn array, and and La_to_bArray carries out contrast and rejects inconsistent sequence number, generates new Lb_to_aArray is also sent to wireless communication Party A;
Label function R (x in described step 1.3i) it is:
Definition with reference to boundary array isWithWherein, meaniFor the RSS meansigma methods of i-th block, α be fluctuate because of Son and α ∈ (0,1), std_derivationiIt it is the RSS standard deviation of i-th block;
Step 2, vector quantization:
Step 2.1, input through discordance remove after effective RSS array Y and the dimension N of vector quantization to be carried out;
Step 2.2, for each y in array YiAll set up N-dimensional vector;
Step 2.3, to each yiAll apply N-dimensional vector quantizer QN(yi), 0,1 bit stream produced after quantifying is as output;
RSS array Y in described step 2.1 is: Y={y1,y2,…,yd, yiRSS value in ∈ Z, Y array is Lb_to_aArray In RSS value corresponding to each sequence number;
Described step 2.2 is yiThe N-dimensional vector set up is:
< y i , y ( i + &Delta; 1 ) mod d , y ( i + &Delta; 1 + &Delta; 2 ) mod d , ... , y ( i + &Delta; 1 + ... + &Delta; N - 1 ) mod d >
Wherein, Δ={ Δ12,…,ΔN-1Be N number of component in N-dimensional vector component interval, ΔjIt is jth component and jth Sequence number interval between+1 component;
N-dimensional vector quantizer Q in described step 2.3N(yi) it is:
Wherein, yiRSS value for the input of N-dimensional vector quantizer;
Step 3, fuzzy extraction: wireless communication both sides utilize Fuzzy extractor to carry out generating inconsistent position in bit stream Error correction also exports identical bit stream as encryption key.
A kind of efficient random physical layer key generation method based on vector quantization the most according to claim 1, its feature Being, the Fuzzy extractor in described step 3 can be defined as:<Gen, Rep>, and parameter is (M, l, T), and wherein, process Gen is Probability generates process, and process Rep is definitiveness recovery process, and M is incoming bit stream set, and l is incoming bit stream length, and T is Ultimate range between the message of wireless communication Party A and wireless communication Party B input limits.
A kind of efficient random physical layer key generation method based on vector quantization the most according to claim 2, its feature Being, first described process Gen is operated by wireless communication Party A, then the parameter of output is passed to wireless network Communication Party B, wireless communication Party B operates according still further to process Rep, wireless communication Party A and wireless communication Party B Produce on all four random secret information R as encryption key.
A kind of efficient random physical layer key generation method based on vector quantization the most according to claim 2, its feature Being, described process Gen is: (R, P) ← Gen (w0), wherein, input parameter w0For the bit stream of a length of l, output parameter R is The random secret information of a length of l, output parameter P is public information.
A kind of efficient random physical layer key generation method based on vector quantization the most according to claim 4, its feature Being, described process Rep is: R ← Rep (w', P), and wherein, input parameter w' is a length of l and and w0Distance be not more than T's Bit stream, input parameter P be Gen process generate the public information for error correction, output parameter R be a length of l with Gen mistake The random secret information of Cheng Xiangtong.
A kind of efficient random physical layer key generation method based on vector quantization the most according to claim 4, its feature Being, described process Gen can preferentially be adopted realization with the following method but is not limited to following method: utilize Bose-Chaudhuri Hocquenghem error correction codes to w0 Carrying out error correction, the error correcting code of generation, as P, utilizes SHA-1 algorithm to w0Carry out Hash process, the input of Hash and output length Ratio is 1:1, generates the strong key of randomness as R.
A kind of efficient random physical layer key generation method based on vector quantization the most according to claim 5, its feature Being, described process Rep can preferentially be adopted realization with the following method but is not limited to following method: utilize Bose-Chaudhuri Hocquenghem error correction codes and Gen During produce error correction sequence P w' is carried out error correction, recover w0Sequence, utilizes SHA-1 algorithm to w0Carry out Hash process, The input of Hash and output length ratio for 1:1, generate the strong key of randomness as R.
CN201410066595.0A 2014-02-26 2014-02-26 A kind of efficient random physical layer key generation method based on vector quantization Expired - Fee Related CN103825725B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410066595.0A CN103825725B (en) 2014-02-26 2014-02-26 A kind of efficient random physical layer key generation method based on vector quantization

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410066595.0A CN103825725B (en) 2014-02-26 2014-02-26 A kind of efficient random physical layer key generation method based on vector quantization

Publications (2)

Publication Number Publication Date
CN103825725A CN103825725A (en) 2014-05-28
CN103825725B true CN103825725B (en) 2016-12-28

Family

ID=50760574

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410066595.0A Expired - Fee Related CN103825725B (en) 2014-02-26 2014-02-26 A kind of efficient random physical layer key generation method based on vector quantization

Country Status (1)

Country Link
CN (1) CN103825725B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104219252A (en) * 2014-09-28 2014-12-17 东南大学 Coding error correction based secret key forward direction consistency calibration method
CN105120453A (en) * 2015-07-15 2015-12-02 中国科学院信息工程研究所 Secret key generation method
CN106059758B (en) * 2016-07-08 2019-03-05 大连理工大学 A kind of key generation method ensuring secure wireless communication
EP4038749A1 (en) * 2019-09-30 2022-08-10 Nokia Technologies Oy Physical layer security by pseudo-random layer mapping
CN114125826A (en) * 2021-11-12 2022-03-01 哈尔滨工业大学 Signal intensity-based physical layer key extraction method, system, device and medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1993925A (en) * 2004-08-04 2007-07-04 松下电器产业株式会社 Radio communication method, radio communication system, and radio communication device
CN101998390A (en) * 2009-08-27 2011-03-30 华为技术有限公司 Method and device for ensuring communication security
CN103402200A (en) * 2013-07-11 2013-11-20 北京邮电大学 Secret key generation method based on wireless channel characteristics in frequency division duplex system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1993925A (en) * 2004-08-04 2007-07-04 松下电器产业株式会社 Radio communication method, radio communication system, and radio communication device
CN101998390A (en) * 2009-08-27 2011-03-30 华为技术有限公司 Method and device for ensuring communication security
CN103402200A (en) * 2013-07-11 2013-11-20 北京邮电大学 Secret key generation method based on wireless channel characteristics in frequency division duplex system

Also Published As

Publication number Publication date
CN103825725A (en) 2014-05-28

Similar Documents

Publication Publication Date Title
CN109584978B (en) Information processing method and system based on signature aggregation medical health monitoring network model
CN111162913B (en) Arbitration quantum signature method based on glass color sampling random unitary operation
CN103825725B (en) A kind of efficient random physical layer key generation method based on vector quantization
CN109728898A (en) Internet-of-things terminal safety communicating method based on block chain technology
CN101814991B (en) Mutual authentication method and system based on identity
CN110086616B (en) Forward one-time pad secret communication method based on wireless channel
CN103259662A (en) Novel procuration signature and verification method based on integer factorization problems
CN103973439B (en) A kind of multi-variable public key ciphering method
CN107947941A (en) A kind of Hamilton quantum arbitrated signature and verification method based on the blind calculating of quantum
Yu-Guang Multi-proxy quantum group signature scheme with threshold shared verification
CN108989309A (en) Encryption communication method and its encrypted communication device based on narrowband Internet of Things
CN109756877A (en) A kind of anti-quantum rapid authentication and data transmission method of magnanimity NB-IoT equipment
CN109347829A (en) A kind of intelligent perception network true value discovery method based on secret protection
CN113141247B (en) Homomorphic encryption method, homomorphic encryption device, homomorphic encryption system and readable storage medium
CN104113420A (en) Identity based aggregate signcryption method
CN101753308A (en) Completeness certification method
Yu-Guang et al. Scalable arbitrated quantum signature of classical messages with multi-signers
Zhou et al. Novel quantum deterministic key distribution protocols with entangled states
CN111416712B (en) Quantum secret communication identity authentication system and method based on multiple mobile devices
CN103023646B (en) The polymerisable label decryption method of a kind of label ciphertext
CN101741544A (en) Time-lag chaos iteration-based digital signature method and device
Feng et al. Arbitrated quantum signature scheme with continuous-variable squeezed vacuum states
CN105978684B (en) Safe communication system and method based on open Limited Feedback and dynamic matrix coding
CN114338001A (en) Efficient signcryption method suitable for Internet of things environment
CN104780169A (en) Quantum repeater network coding scheme based on controller

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20161228

CF01 Termination of patent right due to non-payment of annual fee