期刊
  出版年
  关键词
结果中检索 Open Search
Please wait a minute...
选择: 显示/隐藏图片
1. Methodologies of Secret-Key Agreement Using Wireless Channel Characteristics
Syed Taha Ali and Vijay Sivaraman
ZTE Communications    2013, 11 (3): 20-25.   DOI: DOI:10.3969/j.issn.1673-5188.2013.03.003
摘要61)      PDF (417KB)(49)    收藏
In this article, we give an overview of current research on shared secret-key agreement between two parties. This agreement is based on radio wireless channel characteristics. We discuss the advantages of this approach over traditional cryptographic mechanisms and present the theoretical background of this approach. We then give a detailed description of the key-agreement process and the threat model, and we summarize the typical performance metrics for shared secret-key agreement. There are four processes in shared secret-key agreement: sampling, quantization, information reconciliation, and privacy amplification. We classify prior and current research in this area according to innovation on these four processes. We conclude with a discussion of existing challenges and directions for future work.
相关文章 | 多维度评价