A robust quantization method using a robust Chinese remainder theorem for secret key generation

Wenjie Wang*, Chen Wang, Xiang Gen Xia

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Citation (Scopus)

Abstract

Traditional channel quantization based methods for encryption key generation usually suffer from the quantization error which may decrease the key agreement ratio between authorized users. In this paper, we make use of the reciprocity of the wireless channel in time-division duplex (TDD) mode, and adopt a closed-form robust Chinese remainder theorem (CRT) to extract the encryption key from the noisy channel estimations. The channel coefficients are regarded as the remainders in robust CRT, and the key is generated from the quotient output of the robust CRT. In addition, a remainder selection procedure is proposed to further improve its performance. Simulations demonstrate the effectiveness of the proposed method.

Original languageEnglish
Title of host publication2011 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2011 - Proceedings
Pages1904-1907
Number of pages4
DOIs
Publication statusPublished - 2011
Externally publishedYes
Event36th IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2011 - Prague, Czech Republic
Duration: 22 May 201127 May 2011

Publication series

NameICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings
ISSN (Print)1520-6149

Conference

Conference36th IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2011
Country/TerritoryCzech Republic
CityPrague
Period22/05/1127/05/11

Keywords

  • Chinese remainder theorem (CRT)
  • Cryptography
  • information security
  • key generation
  • physical lay security

Fingerprint

Dive into the research topics of 'A robust quantization method using a robust Chinese remainder theorem for secret key generation'. Together they form a unique fingerprint.

Cite this