2017
DOI: 10.1109/mwc.2017.1500365wc
|View full text |Cite
|
Sign up to set email alerts
|

Secret Key Agreement: Fundamental Limits and Practical Challenges

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
9
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(9 citation statements)
references
References 15 publications
0
9
0
Order By: Relevance
“…Depending on the specific realization, secret key agreement has two models, namely the channel model and source model (Chapter 4 of [47]). The channel model-based key agreement operates similarly to the wiretap channel model, which intends to securely transmit keys from Alice to Bob, and agree on the same key via a two-way public channel [48]- [50]. However, it also faces the same challenges as keyless security in terms of its practical implementation.…”
Section: Key Generationmentioning
confidence: 99%
“…Depending on the specific realization, secret key agreement has two models, namely the channel model and source model (Chapter 4 of [47]). The channel model-based key agreement operates similarly to the wiretap channel model, which intends to securely transmit keys from Alice to Bob, and agree on the same key via a two-way public channel [48]- [50]. However, it also faces the same challenges as keyless security in terms of its practical implementation.…”
Section: Key Generationmentioning
confidence: 99%
“…Most of secret-key agreement or generation methods require the assumptions of time division duplex (TDD) channel reciprocity and near-perfect CSI [23][24][25]. The strong assumptions on CSI have hindered the industrial applications of PLS [26]. When considering realistic CSI errors, the key agreement ratio between legitimate parties is far from perfect in practice [27][28][29].…”
Section: Introductionmentioning
confidence: 99%
“…Wireless communications are vulnerable to being attacked due to the inherent broadcast nature of radio propagation [1]. Encryption and authentication based on symmetric-key are important measures to ensure the security of wireless network, where the critical issue is how to distribute secret keys to the legitimate partners without leaking any information to the eavesdroppers [2]. Conventionally, some computational complexity based methods are developed, such as Diffie-Hellman key exchange protocol, which works on the assumption that the eavesdroppers are unable to solve a certain mathematical problem in feasible time [3].…”
Section: Introductionmentioning
confidence: 99%