Fusing Keys for Secret Communications: Towards Information-Theoretic Security

10/22/2020
by   Longjiang Li, et al.
0

Modern cryptography is essential to communication and information security for performing all kinds of security actions, such as encryption, authentication, and signature. However, the exposure possibility of keys poses a great threat to almost all modern cryptography. This article proposes a key-fusing framework, which enables a high resilience to key exposure by fusing multiple imperfect keys. The correctness of the scheme is strictly verified through a toy model that is general enough to abstract the physical-layer key generation (PLKG) mechanisms. Analysis and results demonstrate that the proposed scheme can dramatically reduce secret outage probability, so that key sources with even high exposure probability can be practically beneficial for actual secret communication. Our framework paves the way for achieving information-theoretic security by integrating various key sources, such as physical layer key generation, lattice-based cryptography, and quantum cryptography.

READ FULL TEXT
research
02/14/2019

Potentially Information-theoretic Secure Y00 Quantum Stream Cipher with Limited Key Lengths beyond One-Time Pad

The previous work showed that the Y00 protocol could stay secure with th...
research
05/29/2018

Recovering short secret keys of RLCE in polynomial time

We present a key recovery attack against Y. Wang's Random Linear Code En...
research
04/04/2023

Establishing shared secret keys on quantum line networks: protocol and security

We show the security of multi-user key establishment on a single line of...
research
08/17/2023

Experimental quantum e-commerce

E-commerce, a type of trading that occurs at a high frequency on the Int...
research
01/20/2020

Physical Layer Security: Authentication, Integrity and Confidentiality

The goal of physical layer security (PLS) is to make use of the properti...
research
05/16/2023

A SKG Security Challenge: Indoor SKG Under an On-The-Shoulder Eavesdropping Attack

Physical layer security (PLS) is seen as the means to enhance physical l...

Please sign up or login with your details

Forgot password? Click here to reset