Information Theoretical Secure Key Sharing Protocol for Noiseless Public Constant Parameter Channels without Cryptographic Assumptions
Title | Information Theoretical Secure Key Sharing Protocol for Noiseless Public Constant Parameter Channels without Cryptographic Assumptions |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Korzhik, Valery, Starostin, Vladimir, Morales-Luna, Guillermo, Kabardov, Muaed, Gerasimovich, Aleksandr, Yakovlev, Victor, Zhuvikin, Aleksey |
Conference Name | 2019 Federated Conference on Computer Science and Information Systems (FedCSIS) |
Keywords | artificial noise, Bit error rate, composability, compositionality, computer network security, constant parameter noiseless public channel, cryptographic assumptions, cryptographic protocols, cryptography, eavesdropper channels, eigenvalues, Eigenvalues and eigenfunctions, information theoretical secure key sharing protocol, Internet, key sharing protocol, matrix algebra, noiseless public constant parameter channels, physical layer security, privacy, Privacy Amplification, privacy amplification procedure, private key cryptography, protocol restrictions, Protocols, pubcrawl, Quantization (signal), Shannon information, Signal to noise ratio, SNR, theoretical cryptography |
Abstract | We propose a new key sharing protocol executed through any constant parameter noiseless public channel (as Internet itself) without any cryptographic assumptions and protocol restrictions on SNR in the eavesdropper channels. This protocol is based on extraction by legitimate users of eigenvalues from randomly generated matrices. A similar protocol was proposed recently by G. Qin and Z. Ding. But we prove that, in fact, this protocol is insecure and we modify it to be both reliable and secure using artificial noise and privacy amplification procedure. Results of simulation prove these statements. |
URL | https://annals-csis.org/proceedings/2019/drp/70.html |
DOI | 10.15439/2019F70 |
Citation Key | korzhik_information_2019 |
- matrix algebra
- theoretical cryptography
- SNR
- Signal to noise ratio
- Shannon information
- Quantization (signal)
- pubcrawl
- Protocols
- protocol restrictions
- private key cryptography
- privacy amplification procedure
- Privacy Amplification
- privacy
- physical layer security
- noiseless public constant parameter channels
- artificial noise
- key sharing protocol
- internet
- information theoretical secure key sharing protocol
- Eigenvalues and eigenfunctions
- eigenvalues
- eavesdropper channels
- Cryptography
- Cryptographic Protocols
- cryptographic assumptions
- constant parameter noiseless public channel
- computer network security
- Compositionality
- composability
- Bit error rate