2013 Proceedings IEEE INFOCOM 2013
DOI: 10.1109/infcom.2013.6567030
|View full text |Cite
|
Sign up to set email alerts
|

Exchanging pairwise secrets efficiently

Abstract: Abstract-We consider the problem where a group of wireless nodes, connected to the same broadcast domain, want to create pairwise secrets, in the presence of an adversary Eve, who tries to listen in and steal these secrets. Existing solutions assume that Eve cannot perform certain computations (e.g., largeinteger factorization) in useful time. We ask the question: can we solve this problem without assuming anything about Eve's computational capabilities?We propose a simple secret-agreement protocol, where the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
4

Relationship

2
6

Authors

Journals

citations
Cited by 12 publications
(11 citation statements)
references
References 12 publications
0
11
0
Order By: Relevance
“…They require extensive privacy amplification mechanisms to obtain keys with sufficient entropy [13]. Key exchange mechanisms as described in [11,6,19,18], in contrast, do not rely on channel variations. They utilize physical layer mechanisms to confidentially transport existing keys to other communication partners without being eavesdropped.…”
Section: Physical Layer Securitymentioning
confidence: 99%
“…They require extensive privacy amplification mechanisms to obtain keys with sufficient entropy [13]. Key exchange mechanisms as described in [11,6,19,18], in contrast, do not rely on channel variations. They utilize physical layer mechanisms to confidentially transport existing keys to other communication partners without being eavesdropped.…”
Section: Physical Layer Securitymentioning
confidence: 99%
“…We built on this idea to propose a concrete secret-key agreement protocol in [3], and we were able to produce secure keys at a rate of Kbps, in an 1-hop test-bed. We further extended our protocols for multi-hop networks in [4], where the existence of interference and multi-path provides additional sources of packet erasures, and we simulated the key-agreement in multi-hop setups up to 5 hops and 500 nodes.…”
Section: Key Construction Based On Erasuresmentioning
confidence: 99%
“…Algorithms that create such unconditionally secure keys were studied theoretically in [2] and translated into practical protocols for 1-hop networks in [3], and for multi-hop networks in [4]. We briefly summarize this work and, building on it, we show how we can, using the created keys and their properties, design a Tor-like anonymization network.…”
Section: Introductionmentioning
confidence: 99%
“…For example, if the sender -call her Alice -transmits random packets through independent erasure channels with erasure probability 0.5, there would be a good fraction of them (approximately 25%) that only one of two users receives, and we can transform this common randomness between Alice and the given user to a key using privacy amplification [7]- [10]. Testbed implementations have demonstrated that a secret-key rate of several tens of Kbps is achievable by exploiting erasures in a practical wireless setting [11], [12].…”
Section: Introductionmentioning
confidence: 99%