The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. ex. Some numerals are expressed as "XNUMX".
Copyrights notice
The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. Copyrights notice
Kami menganggap masalah perjanjian kunci rahsia dalam Model Gaussian Maurer. Dalam model Gaussian Maurer, penerima yang sah, Alice dan Bob, dan seorang penoreh wayar, Eve, menerima isyarat yang dijana secara rawak oleh satelit melalui tiga saluran Gaussian tanpa ingatan bebas masing-masing. Kemudian Alice dan Bob menjana kunci rahsia biasa daripada isyarat yang diterima mereka. Dalam model ini, kami mencadangkan protokol untuk menjana kunci rahsia biasa dengan menggunakan hasil keputusan lembut isyarat diterima Alice dan Bob. Kemudian, kami mengira sempadan bawah pada kadar kunci rahsia dalam protokol yang dicadangkan kami. Hasil daripada perbandingan dengan protokol yang hanya menggunakan keputusan keras, kami mendapati bahawa kadar yang lebih tinggi diperoleh dengan menggunakan protokol kami.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Salinan
Masashi NAITO, Shun WATANABE, Ryutaroh MATSUMOTO, Tomohiko UYEMATSU, "Secret Key Agreement by Soft-Decision of Signals in Gaussian Maurer's Model" in IEICE TRANSACTIONS on Fundamentals,
vol. E92-A, no. 2, pp. 525-534, February 2009, doi: 10.1587/transfun.E92.A.525.
Abstract: We consider the problem of secret key agreement in Gaussian Maurer's Model. In Gaussian Maurer's model, legitimate receivers, Alice and Bob, and a wire-tapper, Eve, receive signals randomly generated by a satellite through three independent memoryless Gaussian channels respectively. Then Alice and Bob generate a common secret key from their received signals. In this model, we propose a protocol for generating a common secret key by using the result of soft-decision of Alice and Bob's received signals. Then, we calculate a lower bound on the secret key rate in our proposed protocol. As a result of comparison with the protocol that only uses hard-decision, we found that the higher rate is obtained by using our protocol.
URL: https://global.ieice.org/en_transactions/fundamentals/10.1587/transfun.E92.A.525/_p
Salinan
@ARTICLE{e92-a_2_525,
author={Masashi NAITO, Shun WATANABE, Ryutaroh MATSUMOTO, Tomohiko UYEMATSU, },
journal={IEICE TRANSACTIONS on Fundamentals},
title={Secret Key Agreement by Soft-Decision of Signals in Gaussian Maurer's Model},
year={2009},
volume={E92-A},
number={2},
pages={525-534},
abstract={We consider the problem of secret key agreement in Gaussian Maurer's Model. In Gaussian Maurer's model, legitimate receivers, Alice and Bob, and a wire-tapper, Eve, receive signals randomly generated by a satellite through three independent memoryless Gaussian channels respectively. Then Alice and Bob generate a common secret key from their received signals. In this model, we propose a protocol for generating a common secret key by using the result of soft-decision of Alice and Bob's received signals. Then, we calculate a lower bound on the secret key rate in our proposed protocol. As a result of comparison with the protocol that only uses hard-decision, we found that the higher rate is obtained by using our protocol.},
keywords={},
doi={10.1587/transfun.E92.A.525},
ISSN={1745-1337},
month={February},}
Salinan
TY - JOUR
TI - Secret Key Agreement by Soft-Decision of Signals in Gaussian Maurer's Model
T2 - IEICE TRANSACTIONS on Fundamentals
SP - 525
EP - 534
AU - Masashi NAITO
AU - Shun WATANABE
AU - Ryutaroh MATSUMOTO
AU - Tomohiko UYEMATSU
PY - 2009
DO - 10.1587/transfun.E92.A.525
JO - IEICE TRANSACTIONS on Fundamentals
SN - 1745-1337
VL - E92-A
IS - 2
JA - IEICE TRANSACTIONS on Fundamentals
Y1 - February 2009
AB - We consider the problem of secret key agreement in Gaussian Maurer's Model. In Gaussian Maurer's model, legitimate receivers, Alice and Bob, and a wire-tapper, Eve, receive signals randomly generated by a satellite through three independent memoryless Gaussian channels respectively. Then Alice and Bob generate a common secret key from their received signals. In this model, we propose a protocol for generating a common secret key by using the result of soft-decision of Alice and Bob's received signals. Then, we calculate a lower bound on the secret key rate in our proposed protocol. As a result of comparison with the protocol that only uses hard-decision, we found that the higher rate is obtained by using our protocol.
ER -