Reliability-Based Sliced Error Correction in Secret Key Agreement from Fading Channel

We consider information reconciliation in secret key agreement from a fading channel where two legitimate parties utilize channel estimates of their fading channel as correlated random variables to generate a secret key. The information reconciliation is a process of correcting the discrepancies between the legitimate parties' keys by public discussion in the presence of eavesdropper, where the amount of the information revealed in the public discussion is needed to be as little as possible. In this paper, we propose information reconciliation protocols using the reliability values of channel estimates in order to correct errors effectively. The proposed information reconciliation protocols are modified versions of a protocol used in quantum key distribution called sliced error correction using Cascade. Simulation results show that the proposed protocols can correct errors with less the number of disclosed bits and less the number of communications than the conventional sliced error correction using Cascade.

[1]  Rao Yarlagadda,et al.  Unconventional cryptographic keying variable management , 1995, IEEE Trans. Commun..

[2]  U. Maurer,et al.  Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.

[3]  Andrew Thangaraj,et al.  LDPC-based Gaussian key reconciliation , 2006, 2006 IEEE Information Theory Workshop - ITW '06 Punta del Este.

[4]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[5]  T. Aono,et al.  Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels , 2005, IEEE Transactions on Antennas and Propagation.

[6]  Gilles Brassard,et al.  Secret-Key Reconciliation by Public Discussion , 1994, EUROCRYPT.

[7]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[8]  Rudolf Ahlswede,et al.  Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.

[9]  T. Sugimoto,et al.  A Study on Secret key Reconciliation Protocol "Cascade" , 2000 .

[10]  Gilles Brassard,et al.  Experimental Quantum Cryptography , 1990, EUROCRYPT.

[11]  Jean Cardinal,et al.  Reconciliation of a quantum-distributed Gaussian key , 2001, IEEE Transactions on Information Theory.

[12]  David Tse,et al.  Channel Identification: Secret Sharing Using Reciprocity in Ultrawideband Channels , 2007, IEEE Transactions on Information Forensics and Security.

[13]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[14]  Ueli Maurer,et al.  Generalized privacy amplification , 1994, Proceedings of 1994 IEEE International Symposium on Information Theory.

[15]  W. Marsden I and J , 2012 .

[16]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..