A survey on secret key generation mechanisms on the physical layer in wireless networks

YEH Shehadeh, D Hogrefe - Security and Communication …, 2015 - Wiley Online Library
Traditional security mechanisms are mainly based on the distribution of shared secret keys.
Yet, this task is nontrivial in large wireless networks, because of mobility and scalability …

Continuous variable quantum key distribution with modulated entangled states

LS Madsen, VC Usenko, M Lassen, R Filip… - Nature …, 2012 - nature.com
Quantum key distribution enables two remote parties to grow a shared key, which they can
use for unconditionally secure communication over a certain distance. The maximal distance …

Secure communication in stochastic wireless networks—Part I: Connectivity

PC Pinto, J Barros, MZ Win - IEEE Transactions on Information …, 2011 - ieeexplore.ieee.org
The ability to exchange secret information is critical to many commercial, governmental, and
military networks. Information-theoretic security-widely accepted as the strictest notion of …

Quasi-cyclic multi-edge LDPC codes for long-distance quantum cryptography

M Milicevic, C Feng, LM Zhang, PG Gulak - NPJ Quantum Information, 2018 - nature.com
The speed at which two remote parties can exchange secret keys in continuous-variable
quantum key distribution (CV-QKD) is currently limited by the computational complexity of …

Secure nested codes for type II wiretap channels

R Liu, Y Liang, HV Poor… - 2007 IEEE Information …, 2007 - ieeexplore.ieee.org
This paper considers the problem of secure coding design for a type II wiretap channel,
where the main channel is noiseless and the eavesdropper channel is a general binary …

Universal hashing for information-theoretic security

H Tyagi, A Vardy - Proceedings of the IEEE, 2015 - ieeexplore.ieee.org
The information-theoretic approach to security entails harnessing the correlated
randomness available in nature to establish security. It uses tools from information theory …

Comprehensive high-speed reconciliation for continuous-variable quantum key distribution

D Guo, C He, T Guo, Z Xue, Q Feng, J Mu - Quantum Information …, 2020 - Springer
Reconciliation is currently the bottleneck of continuous-variable quantum key distribution
systems for its great influence on the key rate and the distance of systems. In this paper, we …

Key reconciliation with low-density parity-check codes for long-distance quantum cryptography

M Milicevic, C Feng, LM Zhang, PG Gulak - arXiv preprint arXiv …, 2017 - arxiv.org
The speed at which two remote parties can exchange secret keys over a fixed-length fiber-
optic cable in continuous-variable quantum key distribution (CV-QKD) is currently limited by …

Secret key agreement with large antenna arrays under the pilot contamination attack

S Im, H Jeon, J Choi, J Ha - IEEE Transactions on Wireless …, 2015 - ieeexplore.ieee.org
We present a secret key agreement (SKA) protocol for a multi-user time-division duplex
system where a base-station (BS) with a large antenna array (LAA) shares secret keys with …

Percolation and connectivity in the intrinsically secure communications graph

PC Pinto, MZ Win - IEEE Transactions on Information Theory, 2012 - ieeexplore.ieee.org
The ability to exchange secret information is critical to many commercial, governmental, and
military networks. The intrinsically secure communications graph (iS-graph) is a random …