Secret key generation from Gaussian sources using lattice-based extractors

06/21/2022
by   Laura Luzzi, et al.
0

We propose a lattice-based scheme for secret key generation from Gaussian sources in the presence of an eavesdropper, and show that it achieves the strong secret key capacity in the case of degraded source models, as well as the optimal secret key / public communication rate trade-off. The key ingredients of our scheme are a lattice extractor to extract the channel intrinsic randomness, based on the notion of flatness factor, together with a randomized lattice quantization technique to quantize the continuous source. Compared to previous works, we introduce two new notions of flatness factor based on L^1 distance and KL divergence, respectively, which are of independent interest. We prove the existence of secrecy-good lattices under L^1 distance and KL divergence, whose L^1 and KL flatness factors vanish for volume-to-noise ratios up to 2π e. This improves upon the volume-to-noise ratio threshold 2π of the L^∞ flatness factor.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/08/2018

Secrecy Capacity under Limited Discussion Rate for Minimally Connected Hypergraphical Sources

We investigate the secret key generation in the multiterminal source mod...
research
02/21/2022

Secret Key-based Authentication With Passive Eavesdropper for Scalar Gaussian Sources

We analyze the fundamental trade-off of secret key-based authentication ...
research
08/17/2023

New Properties of Intrinsic Information and Their Relation to Bound Secrecy

The secret-key rate measures the rate at which Alice and Bob can extract...
research
04/09/2020

Secret Key Generation from Vector Gaussian Sources with Public and Private Communications

In this paper, we consider the problem of secret key generation with one...
research
03/17/2022

Message recovery attack to NTRU using a lattice independent from the public key

In the present paper we introduce a new attack on NTRU-HPS cryptosystem ...
research
02/28/2019

Shared Secret Key Generation via Carrier Frequency Offsets

This work presents a novel method to generate secret keys shared between...
research
09/30/2019

Lattice PUF: A Strong Physical Unclonable Function Provably Secure against Machine Learning Attacks

We propose a strong physical unclonable function (PUF) that is provably ...

Please sign up or login with your details

Forgot password? Click here to reset