2024
DOI: 10.1109/mwc.012.2200289
|View full text |Cite
|
Sign up to set email alerts
|

Information-Theoretic Secure Key Sharing for Wide-Area Mobile Applications

Abstract: With the rapid growth of handheld devices in the internet of things (IoT) networks, mobile applications have become ubiquitous in everyday life. As technology is developed, so do also the risks and threats associated with it, especially in the forthcoming quantum era. Existing IoT networks, however, lack a quantum-resistant secret key sharing scheme to meet confidential message transmission demands in wide-area mobile applications. To address this issue, this article proposes a new scheme, channel reciprocity … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 16 publications
0
1
0
Order By: Relevance
“…To address the aforementioned challenges, this paper proposes a coding scheme built upon error correction coding, aiming to increase the eavesdropper's decoding error rate and enhance key security. Literature indicates a substantial difference between eavesdropping and legitimate channels, with the average inconsistency rate for keys generated by legitimate channels being around 8%, while for keys generated by eavesdroppers, it is approximately 40% [4]. Leveraging this significant difference between eavesdropping and legitimate channels, this paper introduces a scheme based on polar codes [5].…”
Section: Introductionmentioning
confidence: 99%
“…To address the aforementioned challenges, this paper proposes a coding scheme built upon error correction coding, aiming to increase the eavesdropper's decoding error rate and enhance key security. Literature indicates a substantial difference between eavesdropping and legitimate channels, with the average inconsistency rate for keys generated by legitimate channels being around 8%, while for keys generated by eavesdroppers, it is approximately 40% [4]. Leveraging this significant difference between eavesdropping and legitimate channels, this paper introduces a scheme based on polar codes [5].…”
Section: Introductionmentioning
confidence: 99%