Fusing Keys for Secret Communications: Towards Information-Theoretic Security

Modern cryptography is essential to communication and information security for performing all kinds of security actions, such as encryption, authentication, and signature. However, the exposure possibility of keys poses a great threat to almost all modern cryptography. This article proposes a key-fusing framework, which enables a high resilience to key exposure by fusing multiple imperfect keys. The correctness of the scheme is strictly verified through a toy model that is general enough to abstract the physical-layer key generation (PLKG) mechanisms. Analysis and results demonstrate that the proposed scheme can dramatically reduce secret outage probability, so that key sources with even high exposure probability can be practically beneficial for actual secret communication. Our framework paves the way for achieving information-theoretic security by integrating various key sources, such as physical layer key generation, lattice-based cryptography, and quantum cryptography.

[1]  Wade Trappe,et al.  Radio-telepathy: extracting a secret key from an unauthenticated wireless channel , 2008, MobiCom '08.

[2]  Thomas Vidick,et al.  Practical device-independent quantum cryptography via entropy accumulation , 2018, Nature Communications.

[3]  Yi Hong,et al.  Unshared Secret Key Cryptography , 2014, IEEE Transactions on Wireless Communications.

[4]  Yevgeniy Dodis,et al.  Privacy Amplification and Non-malleable Extractors via Character Sums , 2011, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science.

[5]  Eric Miles,et al.  Amplifying Privacy in Privacy Amplification , 2014, IACR Cryptol. ePrint Arch..

[6]  Yi Mu,et al.  Anonymous and Updatable Identity-Based Hash Proof System , 2019, IEEE Systems Journal.

[7]  Sherali Zeadally,et al.  Lattice-Based Public Key Cryptosystem for Internet of Things Environment: Challenges and Solutions , 2019, IEEE Internet of Things Journal.

[8]  Moni Naor,et al.  Public-Key Cryptosystems Resilient to Key Leakage , 2012, SIAM J. Comput..

[9]  U. Maurer,et al.  Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.

[10]  Yevgeniy Dodis,et al.  Cryptography against Continuous Memory Attacks , 2010, 2010 IEEE 51st Annual Symposium on Foundations of Computer Science.

[11]  Eyal Kushilevitz,et al.  Exposure-Resilient Functions and All-or-Nothing Transforms , 2000, EUROCRYPT.

[12]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[13]  Xiaodong Lin,et al.  Toward Edge-Assisted Internet of Things: From Security and Efficiency Perspectives , 2019, IEEE Network.

[14]  Sen-Shan Huang,et al.  An Identity-Based Authenticated Key Exchange Protocol Resilient to Continuous Key Leakage , 2019, IEEE Systems Journal.

[15]  Ning Wang,et al.  Physical Layer Key Generation in 5G Wireless Networks , 2019, IEEE Wireless Communications.