2023
DOI: 10.1109/lcomm.2023.3300462
|View full text |Cite
|
Sign up to set email alerts
|

Secret-Key-Agreement Advantage Distillation With Quantization Correction

Francesco Ardizzon,
Francesco Giurisato,
Stefano Tomasin

Abstract: We consider a physical layer-based secret-keyagreement (SKA) scenario where Alice and Bob aim at extracting a common bit sequence, which should remain secret to Eve, by quantizing a random number obtained from measurements of their communication channel. We propose an asymmetric advantage distillation protocol where i) Alice quantizes her measurement and sends partial information on it over an authenticated public side channel, and ii) Bob (and Eve) quantizes his measurement by exploiting the partial informati… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
0
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 14 publications
0
0
0
Order By: Relevance
“…As also detailed in [18], the proposed protocol requires also a joint quantizer design and the use of quantization error correction. We remark that the quantizers used by Alice, Bob, and Eve are designed before the actual SKA procedure.…”
Section: Advantage-distillation Protocolmentioning
confidence: 99%
See 1 more Smart Citation
“…As also detailed in [18], the proposed protocol requires also a joint quantizer design and the use of quantization error correction. We remark that the quantizers used by Alice, Bob, and Eve are designed before the actual SKA procedure.…”
Section: Advantage-distillation Protocolmentioning
confidence: 99%
“…In this paper, we propose a novel advantagedistillation strategy for the source model SKA, the advantage distillation with quantization correction (ADQC). While in [18], we discussed an advantage-distillation strategy for an ideal scalar Gaussian process, here we consider here a realistic scenario, where two sensors of an UWAN are exploiting the UWACs's measurements to extract the secret key. In particular, the main contributions of this paper are:…”
Section: Introductionmentioning
confidence: 99%