CN103825725B - A kind of efficient random physical layer key generation method based on vector quantization - Google Patents
A kind of efficient random physical layer key generation method based on vector quantization Download PDFInfo
- Publication number
- CN103825725B CN103825725B CN201410066595.0A CN201410066595A CN103825725B CN 103825725 B CN103825725 B CN 103825725B CN 201410066595 A CN201410066595 A CN 201410066595A CN 103825725 B CN103825725 B CN 103825725B
- Authority
- CN
- China
- Prior art keywords
- bit stream
- rss
- wireless communication
- array
- vector quantization
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Landscapes
- Mobile Radio Communication Systems (AREA)
- Compression, Expansion, Code Conversion, And Decoders (AREA)
Abstract
The invention discloses a kind of efficient random physical layer key generation method based on vector quantization.According to the present invention, the wireless communication both sides simultaneously RSS information of detection wireless channel be transferred to the other side respectively, wireless communication both sides take discordance removal, vector quantization and fuzzy extraction step to operate simultaneously, finally give identical bit stream and use as encryption key.The bit production rate of the present invention can reach 284%, can be that under wireless network environment, the authentication encryption algorithm of communicating pair quickly provides random bit stream as encryption key;Communicating pair can reach zero bit error rate, it is ensured that communicating pair is reliably produce on all four bit stream as encryption key, it is ensured that present invention stability during using;The bit stream that the present invention produces can pass through NIST Randomness test, can produce random bit stream as key, it is ensured that the secure communication of communicating pair.
Description
Technical field
This invention belongs to wireless network secure field, relates to one and is efficiently randomly generated for cryptographic algorithm from physical layer
The method of safe key and relevant apparatus.In general, can to meet wireless network secure field close to safety in this invention
The generation speed of key and the requirement of security intensity.
Background technology
Various wireless devices have become as a part indispensable in our daily life, by these equipment
We can carry out information sharing and data exchange.Such as, one group of visitor needs to be shared picture by point-to-point connection, regarded
The resources such as frequency, prevent others to access these resources simultaneously again.In order to enable to dispose and use these to apply safely, it is ensured that number
Just it is particularly important according to confidentiality, integrity and the authentication property of transmission.
The broadcast characteristic of wireless network makes it face the safety problem bigger than cable network, and assailant can be easier
Eavesdropping or the Content of Communication of intercepting legitimate node, wireless device can be modified or counterfeiting to carry out some malicious acts.
Existing wireless encryption system also exists many weak points in some scene, specific as follows:
(1) existing 802.11 safe practices are that Frame provides certification and privacy mechanism, but manage frame and control frame
It is not protected.
(2) theoretical basis of existing security system is that mathematical difficult problem is (such as Large integer factoring problem and discrete right
Number computational problem).Along with the appearance of the development of computing technique, particularly quantum computer, the computing capability of assailant significantly carries
Rising, the safety of these cryptographic techniques based on computational complexity will reduce.
(3) most cryptographic technique, particularly public key cryptography have higher complexity and calculate requirement, so being not suitable for
It is applied in the low distributed wireless networks joined.
(4) traditional security mechanism based on shared key needs key management, distributes, updates and safeguard, along with node
The increase of number, required key number exponentially increases, and key distribution and the workload updated can be the biggest.And at Ad hoc
In network, node frequently joins and departs from network, and this makes key management more difficult.
Based on above reason, introducing safety of physical layer strengthens the scheme of wireless network secure and receives increasing pass
Note.Physical layer key is based on Information theoretical secure, and it can reduce the difficulty of encryption key distribution and renewal, it is achieved layer security,
Improve the safety of existing key code system.
The scheme producing key from physical layer needs based on physical layer channel information.These information include arriving angle
Degree, phase place, received signal strength (RSS), channel impulse response (CIR), signal envelope and cross-point etc..Wherein, receive
Signal intensity (RSS) is the common method generating key, this is because RSS directly can be obtained by existing network interface card.
In general, the standard weighing physical layer key generation method good and bad includes following three kinds:
(1) bit production rate: the key bit number that single RSS ultimately generates;
(2) the key bit error rate: communicating pair generates in key and do not mates the figure place of key and the ratio of key total length;
(3) key randomness: generate the uniformity coefficient of 0 and 1 distribution in the binary stream of key.
Currently, all there is identical problem in the physical layer key generation method that wireless network secure field exists, i.e. these
Method all can not meet higher bit production rate, low error rate, the requirement of high randomness simultaneously.They mostly sacrifice bit production rate
To reduce the bit error rate, and the key generation method of poor efficiency causes node to need to consume big energy carrying out repeatedly sounding channel to produce
The key of raw sufficient length.
Summary of the invention
In view of the deficiencies in the prior art, it is desirable to provide a kind of efficient random physical layer key based on vector quantization
Production method, produces random bit stream rapidly and provides reliable key for communicating pair encryption and certification under wireless environment.
To achieve these goals, the technical solution used in the present invention is as follows:
A kind of efficient random physical layer key generation method based on vector quantization, wireless communication both sides are respectively
The RSS information of detection wireless channel be transferred to the other side simultaneously, wireless communication both sides take discordance to go simultaneously
Remove, vector quantization and fuzzy extraction step operate, and finally give identical bit stream and use as encryption key.
Described method comprises the steps:
Step 1, discordance are removed: remove the inconsistent channel letter caused due to transmission channel half-duplex or ambient noise
Breath;
Step 2, vector quantization: RSS is divided into two intervals according to average line, finally discontinuous RSS value is converted
It it is 0,1 bit stream;
Step 3, fuzzy extraction: wireless communication both sides utilize Fuzzy extractor to generating position inconsistent in bit stream
Carry out error correction and export identical bit stream as encryption key.
Further, discordance removal stage (step 1) comprises the steps:
Step 1.1, input: RSS array X={x collected1,x2,…,xk, xi∈Z;
Step 1.2, piecemeal: RSS value is carried out piecemeal, be referred to as block by block, and k RSS value is different by belonging to
In block, make a length of b of each block, it is assumed that total t block;
Step 1.3, use label function R (xi) RSS value is quantified, the RSS value not being quantized is abandoned;
Step 1.4, definition m are improvement factor, and wireless communication Party A generates 0,1 sequence according to label function, runs into
Continuously m position identical 0 or 1, then by the sequence number record of interposition at La_to_bIn array, generate La_to_b={ l1,l2,…,la,
And it is sent to wireless communication Party B;
Step 1.5, wireless communication Party B according to label function generate 0,1 sequence, run into continuous m position identical 0 or
1, then by the sequence number record of interposition at Lb_to_aIn array, and and La_to_bArray contrasts, and rejects inconsistent sequence number, raw
The L of Cheng Xinb_to_aArray is also sent to wireless communication Party A.
It should be noted that described label function R (xi) it is:
Wherein, with reference to boundary array it is With meaniFor the RSS meansigma methods of i-th block, α be fluctuate because of
Son and α ∈ (0,1), std_derivationiIt it is the RSS standard deviation of i-th block.
Further, vector quantization stage (step 2) comprises the steps:
Step 2.1, input through discordance remove after effective RSS array Y and the dimension N of vector quantization;
Step 2.2, for each y in array YiAll set up N-dimensional vector;
Step 2.3, to each yiAll apply N-dimensional vector quantizer QN(yi), will quantify after produce 0,1 bit stream as
Output.
It should be noted that RSS array Y in described step 2.1 is: Y={y1,y2,…,yd, yiIn ∈ Z, Y array
RSS value be Lb_to_aRSS value corresponding to each sequence number in array.
It should be noted that described step 2.2 is yiThe N-dimensional vector set up is:
Need it is further noted that N-dimensional vector quantizer Q in described step 2.3N(yi) it is:
In fuzzy extraction process (step 3), Fuzzy extractor can be defined as:<Gen, Rep>, parameter be (M, l, t), its
In, process Gen is that probability generates process, and process Rep is definitiveness recovery process, and M is incoming bit stream set, and l is input ratio
Special stream length, t is that the ultimate range between the message of wireless communication Party A and wireless communication Party B input limits.
First described process Gen is operated by wireless communication Party A, then passes to wireless by parameter P of output
Network service Party B, wireless communication Party B operates according still further to process Rep, wireless communication Party A and wireless communication
Party B produces on all four random secret information R as encryption key.
Process Gen is: (R, P) ← Gen (w0), wherein, input parameter w0For the bit stream of a length of l, output parameter R is
The random secret information of a length of l, output parameter P is public information.
Process Rep is: R ← Rep (w', P), and wherein, input parameter w' is a length of l and and w0Distance be not more than t's
Bit stream, input parameter P be process Gen generate the public information for error correction, output parameter R be a length of l with Gen mistake
The random secret information of Cheng Xiangtong.
It should be noted that process Gen can preferentially be adopted realization with the following method but is not limited to following method: utilize
Bose-Chaudhuri Hocquenghem error correction codes is to w0Just error correction, the error correcting code of generation, as P, utilizes SHA-1 algorithm to w0Carry out Hash process, Hash defeated
Enter with output length ratio for 1:1, generate the strong key of randomness as R.
It should be noted that process Rep can preferentially be adopted realization with the following method but is not limited to following method: utilize
The error correction sequence P produced during Bose-Chaudhuri Hocquenghem error correction codes and Gen carries out error correction to w', recovers w0Sequence, utilizes SHA-1 algorithm to w0
Carrying out Hash process, the input of Hash and output length ratio for 1:1, generate the strong key of randomness as R.
The present invention has the beneficial effects that:
(1) the bit production rate of the present invention can reach 284%, and average each RSS value can produce 2.84 bits,
Can be that under wireless network environment, the authentication encryption algorithm of communicating pair quickly provides random bit stream as encryption key;
(2) present invention is in the application, and communicating pair can reach zero bit error rate, it is ensured that communicating pair is reliably produce
On all four bit stream is as encryption key, it is ensured that present invention stability during using;
(3) bit stream that the present invention produces has passed through NIST Randomness test, can be that authentication encryption algorithm provides random
Bit stream as encryption key, it is ensured that the secure communication of communicating pair.
Accompanying drawing explanation
Fig. 1 is the schematic flow sheet of the present invention;
Fig. 2 is that two-dimensional vector quantifies schematic diagram;
Fig. 3 is the organigram of Fuzzy extractor.
Detailed description of the invention
Below in conjunction with drawings and Examples, the invention will be further described.
As it is shown in figure 1, the present invention is Replication Approach in Mobile Environment, efficient random physical layer key based on vector quantization produces
Method, wireless communication both sides Alice and the Bob simultaneously RSS information of detection wireless channel be transferred to the other side, both sides respectively
Take this method to operate simultaneously, finally give identical bit stream and use as encryption key.
Described method comprises the steps:
Step 1, discordance are removed: remove the inconsistent channel letter caused due to transmission channel half-duplex or ambient noise
Breath;
Step 2, vector quantization: RSS is divided into two intervals according to average line, finally discontinuous RSS value is converted
It it is 0,1 bit stream;
Step 3, fuzzy extract: both sides utilize Fuzzy extractor to carry out error correction defeated to generating inconsistent position in bit stream
Go out identical bit stream as encryption key.
Further, discordance removal stage (step 1) comprises the steps:
Step 1.1, input: RSS array X={x collected1,x2,…,xk, xi∈Z;
Step 1.2, piecemeal: RSS value is carried out piecemeal, be referred to as block by block, and k RSS value is different by belonging to
In block, make a length of b of each block, it is assumed that total t block;
Step 1.3, use label function R (xi) RSS value is quantified, the RSS value not being quantized is abandoned;
Step 1.4, definition m are improvement factor, and Alice generates 0,1 sequence according to label function, runs into continuous m position identical
0 or 1, then by the sequence number record of interposition at La_to_bIn array, generate La_to_b={ l1,l2,…,la, and it is sent to Bob;
Step 1.5, Bob generate 0,1 sequence according to label function, and run into that continuous m position is identical 0 or 1, then by interposition
Sequence number record is at Lb_to_aIn array, and and La_to_bArray contrasts, and rejects inconsistent sequence number, generates new Lb_to_aNumber
Group is also sent to Alice.
It should be noted that described label function R (xi) it is:
Wherein, with reference to boundary array it is With meaniFor the RSS meansigma methods of i-th block, α be fluctuate because of
Son and α ∈ (0,1), std_derivationiIt it is the RSS standard deviation of i-th block.
Further, vector quantization stage (step 2) comprises the steps:
Step 2.1, input through discordance remove after effective RSS array Y and the dimension N of vector quantization;
Step 2.2, for each y in array YiAll set up N-dimensional vector;
Step 2.3, to each yiAll apply N-dimensional vector quantizer QN(yi), will quantify after produce 0,1 bit stream as
Output.
It should be noted that RSS array Y in described step 2.1 is: Y={y1,y2,…,yd, yiIn ∈ Z, Y array
RSS value be Lb_to_aRSS value corresponding to each sequence number in array.
It should be noted that described step 2.2 is each yiThe N-dimensional vector set up is: Wherein, Δ={ Δ1,Δ2,…,ΔN-1It is in N-dimensional vector
The component interval of N number of component, ΔjIt it is the sequence number interval between jth component and+1 component of jth.
Need it is further noted that N-dimensional vector quantizer Q in described step 2.3N(yi) it is: Wherein, yiRSS value for the input of N-dimensional vector quantizer.
Two-dimensional vector quantifies as in figure 2 it is shown, work as and input as yiTime, with ΔiSecond component is found backward for intervalComposition two-dimensional vectorAnd calculate label function-output R (y according to the two componenti) andThis label output valve of twoIt is 01,01 to be yiTwo-dimensional vector quantify defeated
Go out.
As it is shown on figure 3, in fuzzy extraction process (step 3), Fuzzy extractor can be defined as:<Gen, Rep>, and parameter is
(M, l, t), wherein, process Gen is that probability generates process, and process Rep is definitiveness recovery process, and M is incoming bit stream set,
L is incoming bit stream length, t be Alice and Bob input message between ultimate range limit.
First described process Gen is operated by Alice, then the parameter of output is passed to Bob, and Bob is according still further to mistake
Journey Rep operates, Alice and Bob produces on all four random secret information R as encryption key.
Process Gen is: (R, P) ← Gen (w0), wherein, input parameter w0For the bit stream of a length of l, output parameter R is
The random secret information of a length of l, output parameter P is public information.
Process Rep is: R ← Rep (w', P), and wherein, input parameter w' is a length of l and and w0Distance be not more than t's
Bit stream, input parameter P be Gen process generate the public information for error correction, output parameter R be a length of l with Gen mistake
The random secret information of Cheng Xiangtong.
Embodiment
In the present embodiment, communicating pair Alice and Bob is separately operable on two PC, and the operating system of lift-launch is
Ubuntu12.04, uses the network interface card Atheros TL-WN650G of same model, Madwifi drives, be operated in 802.11g
Transmitting-receiving bag under pattern.In this implementation process, Madwifi is modified by we, with the addition of the reply to beacon frame,
Beacon_ack frame carries the serial number identical with beacon frame, and by the coupling of serial number, communicating pair can complete RSS's
Pairing, a length of 49 bytes of beacon_ack.Bob moves back and forth around Alice and sends out to Alice for interval with 100ms
Sending beacon frame, Alice can record serial number and corresponding RSS value after receiving beacon frame, and sends one to Bob at once
The acknowledgement frame of beacon_ack.After Bob receives acknowledgement frame, record serial number and corresponding RSS value equally.At the present embodiment
In, have collected 120000 RSS altogether.
Step one, discordance is removed.
Due to Alice and Bob measure RSS value time there will be some errors, the fluctuating margin of both sides the most always as,
So RSS piecemeal is processed, calculate for each piece and quantify bound, the RSS of Alice with Bob in each piece can be made similar
Du Genggao, thus reduce the bit error rate.In the present embodiment, the size block value of RSS sequence piecemeal is 80.
Fluctuation factor-alpha is the important factor in order reducing the bit error rate, α the biggest (little), with reference to boundary Q+And Q-Range averaging line
Distance the most remote (closely), there is the probability the highest (low) that the point of little deviation is disallowable, the bit error rate can decline (rising), but with
Time two with reference to the point being rejected the most (lack) between boundaries, bit production rate decline (rising) can be caused.In this reality
Executing in example, α value is 0.2.
Improvement factor m is the biggest, meets continuous m position and is both greater than Q+Or less than Q-Point the fewest, consult generate effective RSS value
The fewest, so can significantly reduce along with m increases bit production rate, and m increases the feelings meaning the RSS significantly saltus step of continuous m position
Condition reduces, so the bit error rate can decline accordingly;Otherwise, m reduces then effective RSS number and can be greatly increased, and bit production rate increases
Adding, and the situation of m position significantly saltus step continuously increases, the bit error rate reduces, and in the present embodiment, m value is 2.
Step 2, vector quantization.
N-dimensional vector quantization represents the output of the input correspondence N number of bit of generation of an effective RSS, so the biggest bit of N
Exporting the longest, the bit stream being available for generating key is the biggest, finally makes bit production rate increase.But N means the most greatly bit
The increased number reused, the independence between bit reduces, and randomness weakens.In the present embodiment, Δ is chosen1=Δ2=...=
ΔN-1=60, the distribution ratio that vector corresponding for the most each RSS is mapped on N-dimensional solid axes is more uniform, in addition the choosing of Δ
Take and bit production rate and the bit error rate are not the most affected.
Step 3, fuzzy extraction.
In the present embodiment, the process carrying out fuzzy extraction is as follows:
(1) Alice generates bit stream w by vector quantization0, as the input of Gen, by BCH (23,12) Error Correction of Coding
Generate error correction sequence P, and to w0Carrying out SHA-1 Hash and generate the key that randomness is strong, the input of Hash with output length ratio is
1:1。
(2) Alice error correction sequence P is sent to Bob, Bob use P to oneself quantify generate bit stream w' entangle
Mistake, recovers w0Sequence, carries out SHA-1 Hash the most equally and generates identical random key.
BCH (23, the 12) true form a length of 12 chosen in this process, error correction code length is 11, and its minimum distance is
7,3 mistakes can be corrected.Bit stream is divided into every 12 one group by us, generates 11 corresponding error correcting codes and is sent to communication
The other side, these 11 error correcting codes can at most correct 3 bit-errors in 12 true forms.After BCH code error correction, Alice and Bob generates
Key completely the same, there is not any error bit, reach zero bit error rate.
For a person skilled in the art, can technical scheme as described above and design, make other each
Kind corresponding change and deformation, and all these changes and deformation all should be at the protection domain of the claims in the present invention
Within.
Claims (7)
1. an efficient random physical layer key generation method based on vector quantization, it is characterised in that:
The wireless communication both sides simultaneously RSS information of detection wireless channel be transferred to the other side respectively, wireless network leads to
Letter both sides take discordance removal, vector quantization and fuzzy extraction step to operate simultaneously, finally give identical
Bit stream uses as encryption key;
Described method comprises the steps:
Step 1, discordance are removed: remove the inconsistent channel information caused due to transmission channel half-duplex or ambient noise;
Described step 1 comprises the steps:
Step 1.1, input: RSS array X={x collected1,x2,…,xk},xi∈Z;
Step 1.2, piecemeal: RSS value is carried out piecemeal, be referred to as block by block, and k RSS value will belong in different block,
Make a length of b of each block, it is assumed that total t block;
Step 1.3, use label function R (xi) RSS value is quantified, the RSS value not being quantized is abandoned;
Step 1.4, definition m are improvement factor, and wireless communication Party A generates 0,1 sequence according to label function, runs into continuous m
Position identical 0 or 1, then by the sequence number record of interposition at La_to_bIn array, generate La_to_b={ l1,l2,…,la, and send
To wireless communication Party B;
Step 1.5, wireless communication Party B generate 0,1 sequence according to label function, run into that continuous m position is identical 0 or 1, then
By the sequence number record of interposition at Lb_to_aIn array, and and La_to_bArray carries out contrast and rejects inconsistent sequence number, generates new
Lb_to_aArray is also sent to wireless communication Party A;
Label function R (x in described step 1.3i) it is:
Definition with reference to boundary array isWithWherein, meaniFor the RSS meansigma methods of i-th block, α be fluctuate because of
Son and α ∈ (0,1), std_derivationiIt it is the RSS standard deviation of i-th block;
Step 2, vector quantization:
Step 2.1, input through discordance remove after effective RSS array Y and the dimension N of vector quantization to be carried out;
Step 2.2, for each y in array YiAll set up N-dimensional vector;
Step 2.3, to each yiAll apply N-dimensional vector quantizer QN(yi), 0,1 bit stream produced after quantifying is as output;
RSS array Y in described step 2.1 is: Y={y1,y2,…,yd, yiRSS value in ∈ Z, Y array is Lb_to_aArray
In RSS value corresponding to each sequence number;
Described step 2.2 is yiThe N-dimensional vector set up is:
Wherein, Δ={ Δ1,Δ2,…,ΔN-1Be N number of component in N-dimensional vector component interval, ΔjIt is jth component and jth
Sequence number interval between+1 component;
N-dimensional vector quantizer Q in described step 2.3N(yi) it is:
Wherein, yiRSS value for the input of N-dimensional vector quantizer;
Step 3, fuzzy extraction: wireless communication both sides utilize Fuzzy extractor to carry out generating inconsistent position in bit stream
Error correction also exports identical bit stream as encryption key.
A kind of efficient random physical layer key generation method based on vector quantization the most according to claim 1, its feature
Being, the Fuzzy extractor in described step 3 can be defined as:<Gen, Rep>, and parameter is (M, l, T), and wherein, process Gen is
Probability generates process, and process Rep is definitiveness recovery process, and M is incoming bit stream set, and l is incoming bit stream length, and T is
Ultimate range between the message of wireless communication Party A and wireless communication Party B input limits.
A kind of efficient random physical layer key generation method based on vector quantization the most according to claim 2, its feature
Being, first described process Gen is operated by wireless communication Party A, then the parameter of output is passed to wireless network
Communication Party B, wireless communication Party B operates according still further to process Rep, wireless communication Party A and wireless communication Party B
Produce on all four random secret information R as encryption key.
A kind of efficient random physical layer key generation method based on vector quantization the most according to claim 2, its feature
Being, described process Gen is: (R, P) ← Gen (w0), wherein, input parameter w0For the bit stream of a length of l, output parameter R is
The random secret information of a length of l, output parameter P is public information.
A kind of efficient random physical layer key generation method based on vector quantization the most according to claim 4, its feature
Being, described process Rep is: R ← Rep (w', P), and wherein, input parameter w' is a length of l and and w0Distance be not more than T's
Bit stream, input parameter P be Gen process generate the public information for error correction, output parameter R be a length of l with Gen mistake
The random secret information of Cheng Xiangtong.
A kind of efficient random physical layer key generation method based on vector quantization the most according to claim 4, its feature
Being, described process Gen can preferentially be adopted realization with the following method but is not limited to following method: utilize Bose-Chaudhuri Hocquenghem error correction codes to w0
Carrying out error correction, the error correcting code of generation, as P, utilizes SHA-1 algorithm to w0Carry out Hash process, the input of Hash and output length
Ratio is 1:1, generates the strong key of randomness as R.
A kind of efficient random physical layer key generation method based on vector quantization the most according to claim 5, its feature
Being, described process Rep can preferentially be adopted realization with the following method but is not limited to following method: utilize Bose-Chaudhuri Hocquenghem error correction codes and Gen
During produce error correction sequence P w' is carried out error correction, recover w0Sequence, utilizes SHA-1 algorithm to w0Carry out Hash process,
The input of Hash and output length ratio for 1:1, generate the strong key of randomness as R.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410066595.0A CN103825725B (en) | 2014-02-26 | 2014-02-26 | A kind of efficient random physical layer key generation method based on vector quantization |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410066595.0A CN103825725B (en) | 2014-02-26 | 2014-02-26 | A kind of efficient random physical layer key generation method based on vector quantization |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103825725A CN103825725A (en) | 2014-05-28 |
CN103825725B true CN103825725B (en) | 2016-12-28 |
Family
ID=50760574
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410066595.0A Expired - Fee Related CN103825725B (en) | 2014-02-26 | 2014-02-26 | A kind of efficient random physical layer key generation method based on vector quantization |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103825725B (en) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104219252A (en) * | 2014-09-28 | 2014-12-17 | 东南大学 | Coding error correction based secret key forward direction consistency calibration method |
CN105120453A (en) * | 2015-07-15 | 2015-12-02 | 中国科学院信息工程研究所 | Secret key generation method |
CN106059758B (en) * | 2016-07-08 | 2019-03-05 | 大连理工大学 | A kind of key generation method ensuring secure wireless communication |
EP4038749A1 (en) * | 2019-09-30 | 2022-08-10 | Nokia Technologies Oy | Physical layer security by pseudo-random layer mapping |
CN114125826A (en) * | 2021-11-12 | 2022-03-01 | 哈尔滨工业大学 | Signal intensity-based physical layer key extraction method, system, device and medium |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1993925A (en) * | 2004-08-04 | 2007-07-04 | 松下电器产业株式会社 | Radio communication method, radio communication system, and radio communication device |
CN101998390A (en) * | 2009-08-27 | 2011-03-30 | 华为技术有限公司 | Method and device for ensuring communication security |
CN103402200A (en) * | 2013-07-11 | 2013-11-20 | 北京邮电大学 | Secret key generation method based on wireless channel characteristics in frequency division duplex system |
-
2014
- 2014-02-26 CN CN201410066595.0A patent/CN103825725B/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1993925A (en) * | 2004-08-04 | 2007-07-04 | 松下电器产业株式会社 | Radio communication method, radio communication system, and radio communication device |
CN101998390A (en) * | 2009-08-27 | 2011-03-30 | 华为技术有限公司 | Method and device for ensuring communication security |
CN103402200A (en) * | 2013-07-11 | 2013-11-20 | 北京邮电大学 | Secret key generation method based on wireless channel characteristics in frequency division duplex system |
Also Published As
Publication number | Publication date |
---|---|
CN103825725A (en) | 2014-05-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109584978B (en) | Information processing method and system based on signature aggregation medical health monitoring network model | |
CN111162913B (en) | Arbitration quantum signature method based on glass color sampling random unitary operation | |
CN103825725B (en) | A kind of efficient random physical layer key generation method based on vector quantization | |
CN109728898A (en) | Internet-of-things terminal safety communicating method based on block chain technology | |
CN101814991B (en) | Mutual authentication method and system based on identity | |
CN110086616B (en) | Forward one-time pad secret communication method based on wireless channel | |
CN103259662A (en) | Novel procuration signature and verification method based on integer factorization problems | |
CN103973439B (en) | A kind of multi-variable public key ciphering method | |
CN107947941A (en) | A kind of Hamilton quantum arbitrated signature and verification method based on the blind calculating of quantum | |
Yu-Guang | Multi-proxy quantum group signature scheme with threshold shared verification | |
CN108989309A (en) | Encryption communication method and its encrypted communication device based on narrowband Internet of Things | |
CN109756877A (en) | A kind of anti-quantum rapid authentication and data transmission method of magnanimity NB-IoT equipment | |
CN109347829A (en) | A kind of intelligent perception network true value discovery method based on secret protection | |
CN113141247B (en) | Homomorphic encryption method, homomorphic encryption device, homomorphic encryption system and readable storage medium | |
CN104113420A (en) | Identity based aggregate signcryption method | |
CN101753308A (en) | Completeness certification method | |
Yu-Guang et al. | Scalable arbitrated quantum signature of classical messages with multi-signers | |
Zhou et al. | Novel quantum deterministic key distribution protocols with entangled states | |
CN111416712B (en) | Quantum secret communication identity authentication system and method based on multiple mobile devices | |
CN103023646B (en) | The polymerisable label decryption method of a kind of label ciphertext | |
CN101741544A (en) | Time-lag chaos iteration-based digital signature method and device | |
Feng et al. | Arbitrated quantum signature scheme with continuous-variable squeezed vacuum states | |
CN105978684B (en) | Safe communication system and method based on open Limited Feedback and dynamic matrix coding | |
CN114338001A (en) | Efficient signcryption method suitable for Internet of things environment | |
CN104780169A (en) | Quantum repeater network coding scheme based on controller |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20161228 |
|
CF01 | Termination of patent right due to non-payment of annual fee |