Результаты исследований: Публикации в книгах, отчётах, сборниках, трудах конференций › статья в сборнике материалов конференции › научная › Рецензирование
The method of secret key sharing between units that did not possess any secret keys in advance is considered. It is assumed that between these units there are duplex wireless MIMO fading channels. In a recent paper published by D. Qin and Z. Dingh a new key sharing protocol has been proposed between legitimate users based on eigenvalues which are invariant under permutation of two matrices in their product. We extend this statement to a characteristic polynomial and by the way to matrix trace. Methods of key bits extraction are optimized both theoretically and experimentally. On the contrary to a statement of D. Qin and Z. Ding we prove that their key sharing protocol occurs insecure if eavesdroppers have the same channels as legitimate users. In order to provide reliability and security of the shared keys both error correction codes and privacy amplification methods can be used.
Язык оригинала | английский |
---|---|
Название основной публикации | Proceedings of the 2018 Federated Conference on Computer Science and Information Systems, FedCSIS 2018 |
Редакторы | Maria Ganzha, Leszek Maciaszek, Leszek Maciaszek, Marcin Paprzycki |
Издатель | Institute of Electrical and Electronics Engineers Inc. |
Страницы | 569-576 |
Число страниц | 8 |
ISBN (электронное издание) | 9788394941970 |
DOI | |
Состояние | Опубликовано - 26 окт 2018 |
Событие | 2018 Federated Conference on Computer Science and Information Systems, FedCSIS 2018 - Poznan, Польша Продолжительность: 9 сен 2018 → 12 сен 2018 |
Название | Proceedings of the 2018 Federated Conference on Computer Science and Information Systems, FedCSIS 2018 |
---|
конференция | 2018 Federated Conference on Computer Science and Information Systems, FedCSIS 2018 |
---|---|
Страна/Tерритория | Польша |
Город | Poznan |
Период | 9/09/18 → 12/09/18 |
ID: 74861781