Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › peer-review
The method of secret key sharing between units that did not possess any secret keys in advance is considered. It is assumed that between these units there are duplex wireless MIMO fading channels. In a recent paper published by D. Qin and Z. Dingh a new key sharing protocol has been proposed between legitimate users based on eigenvalues which are invariant under permutation of two matrices in their product. We extend this statement to a characteristic polynomial and by the way to matrix trace. Methods of key bits extraction are optimized both theoretically and experimentally. On the contrary to a statement of D. Qin and Z. Ding we prove that their key sharing protocol occurs insecure if eavesdroppers have the same channels as legitimate users. In order to provide reliability and security of the shared keys both error correction codes and privacy amplification methods can be used.
Original language | English |
---|---|
Title of host publication | Proceedings of the 2018 Federated Conference on Computer Science and Information Systems, FedCSIS 2018 |
Editors | Maria Ganzha, Leszek Maciaszek, Leszek Maciaszek, Marcin Paprzycki |
Publisher | Institute of Electrical and Electronics Engineers Inc. |
Pages | 569-576 |
Number of pages | 8 |
ISBN (Electronic) | 9788394941970 |
DOIs | |
State | Published - 26 Oct 2018 |
Event | 2018 Federated Conference on Computer Science and Information Systems, FedCSIS 2018 - Poznan, Poland Duration: 9 Sep 2018 → 12 Sep 2018 |
Name | Proceedings of the 2018 Federated Conference on Computer Science and Information Systems, FedCSIS 2018 |
---|
Conference | 2018 Federated Conference on Computer Science and Information Systems, FedCSIS 2018 |
---|---|
Country/Territory | Poland |
City | Poznan |
Period | 9/09/18 → 12/09/18 |
ID: 74861781