Achieving semantic security without keys through coding and all-or-nothing transforms over wireless channels

We propose a simple protocol which allows two legitimate parties to exchange some confidential message over a wireless channel with some chosen level of semantic security against passive eavesdroppers, and without needing either secret or public keys. The proposed method leverages the noisy and fading nature of the channel and exploits coding and all-or-nothing transforms to achieve the desired level of semantic security. We also define suitable metrics to estimate the semantic security level in the considered setting.