Next Article in Journal
Second Law Analysis for Couple Stress Fluid Flow through a Porous Medium with Constant Heat Flux
Next Article in Special Issue
Secure Communication for Two-Way Relay Networks with Imperfect CSI
Previous Article in Journal
Traction Inverter Open Switch Fault Diagnosis Based on Choi–Williams Distribution Spectral Kurtosis and Wavelet-Packet Energy Shannon Entropy
Previous Article in Special Issue
Semantic Security with Practical Transmission Schemes over Fading Wiretap Channels
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

An Efficient Advantage Distillation Scheme for Bidirectional Secret-Key Agreement

1
School of Information Science and technology, Donghua University, Shanghai 201620, China
2
School of electronics and information, Soochow University, Soochow 215000, China
3
School of electronic and Information Engineering, Xi’an Jiao Tong University, Xi’an 710000, China
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Entropy 2017, 19(9), 505; https://doi.org/10.3390/e19090505
Submission received: 30 July 2017 / Revised: 30 August 2017 / Accepted: 14 September 2017 / Published: 18 September 2017
(This article belongs to the Special Issue Information-Theoretic Security)

Abstract

:
The classical secret-key agreement (SKA) scheme includes three phases: (a) advantage distillation (AD), (b) reconciliation, and (c) privacy amplification. Define the transmission rate as the ratio between the number of raw key bits obtained by the AD phase and the number of transmitted bits in the AD. The unidirectional SKA, whose transmission rate is 0.5 , can be realized by using the original two-way wiretap channel as the AD phase. In this paper, we establish an efficient bidirectional SKA whose transmission rate is nearly 1 by modifying the two-way wiretap channel and using the modified two-way wiretap channel as the AD phase. The bidirectional SKA can be extended to multiple rounds of SKA with the same performance and transmission rate. For multiple rounds of bidirectional SKA, we have provided the bit error rate performance of the main channel and eavesdropper’s channel and the secret-key capacity. It is shown that the bit error rate (BER) of the main channel was lower than the eavesdropper’s channel and we prove that the transmission rate was nearly 1 when the number of rounds was large. Moreover, the secret-key capacity C s was from 0.04 to 0.1 as the error probability of channel was from 0.01 to 0.15 in binary symmetric channel (BSC). The secret-key capacity was close to 0.3 as the signal-to-noise ratio increased in the additive white Gaussian noise (AWGN) channel.

1. Introduction

The one-time pad was developed by Vernam [1], by which a group of users can communicate messages among themselves securely if they share a common secret key beforehand. However, the key rate should be at least the message rate [2], and so the problem of secure communication effectively turns into the problem of secret-key agreement (SKA). In the SKA problem, legitimate users Alice and Bob aim at agreeing on a sequence of bits (key) that must be kept secret from the passive eavesdropper Eve. As shown in Figure 1, the classical SKA scheme includes three phases: (a) advantage distillation (AD), (b) reconciliation, and (c) privacy amplification [3]. AD aims to provide the legitimate agents an advantage over the eavesdropper. Information reconciliation aims at generating an identical random sequence at both Alice and Bob. Privacy amplification is the step that extracts a secret key from the identical random sequence agreed upon by the legitimate agents [4].
Bounds for the secret-key capacity have been derived for a large variety of communication channels [5,6,7,8,9]. Unfortunately, most do not provide direct insight into the design of practical secret-key capacity-achieving schemes. SKA based on noisy channels was presented in [5,10] using an additional insecure but authenticated public channel in which a third party can eavesdrop the communication but cannot forge it. This approach was recently extended in [11] to the model where the players share correlated Gaussian sources. In [12], opportunistic transmission was proposed for SKA over the quasi-static fading channel by sending signals only when the channel condition for the two legitimate players is better than the one for an adversary. The use of the reciprocity of wireless channels has been studied in [13,14,15] to study the key agreement. In [16], the SKA with public discussion was studied based on Gaussian and fading channels.
It is well known that Wyner [17] introduced the wiretap channel, in which a sequence M is transmitted from Alice to Bob over the main channel, while Eve is wiretapping over the eavesdropper’s channel. Wyner proved that Alice could send M to Bob in almost perfect secrecy if the main channel between Alice and Bob is better than Eve’s eavesdropper channel. Nevertheless, the assumption that the main channel is better (lower error rate) than the eavesdropper’s channel is generally impractical. This problem can be solved by using a two-way communication (TWC) as the main channel [18]. By using TWC, the message received by Eve over the eavesdropper’s channel is noisier than the message received by Bob. Therefore, the TWC scheme can be used as an AD scheme. Obviously, if we combine this AD scheme with any reconciliation and privacy amplification steps, the result can be used as secret keys between Alice and Bob [19]. However, the SKA of [18] is unidirectional from Alice to Bob, and therefore the transmission rate of this SKA is slow.
In this paper, emphasis is placed on the AD over the binary symmetric channel (BSC) and additive white Gaussian noise (AWGN) channel. We present a novel approach in building the two-way wiretap channel (TWWC) for bidirectional SKA. Different from all previous works, we will modify the original TWC scheme to be a bidirectional AD scheme to increase the transmission rate of the SKA and study the proposed AD over BSC and AWGN channel. We calculate the secret-key capacity of the proposed AD scheme to measure how many secret key bits can be shared between Alice and Bob. The advantages of the proposed bidirectional AD scheme are as follows.
  • The proposed AD scheme provides an advantage of Alice and Bob over Eve when the channel between Alice and Bob is not less noisy than Eve’s eavesdropper channel.
  • The unidirectional SKA—whose transmission rate is 0.5—can be realized by using the original TWWC as the AD scheme. However, a bidirectional SKA whose transmission rate is 1 can be realized by using the proposed AD scheme.
The remainder of this paper is organized as follows. Section 2 presents a general two-way wiretap channel; A single round of the SKA with the proposed AD scheme is introduced in Section 3; The proposed AD scheme is extended to multiple rounds and is introduced in Section 4; Section 5 proposes a bidirectional secret-key agreement over AWGN channel; Section 6 shows performances of the proposed systems; Finally, conclusions are drawn in Section 7.

2. Original Two-Way Wiretap Channel

2.1. Transmission Scheme

A TWWC between Alice and Bob was described in [18], in which the channel from Alice to Bob was considered to be error-free due to the powerful Low Density Parity Check (LDPC) codes. In this paper, we consider an original TWWC model shown in Figure 2, in which both main channel and eavesdropper channel are not error free.
The notations used throughout this paper are given in Table 1. In the conventional TWWC, to initiate a secure communication, Bob first transmits a random sequence Q to Alice. For i = 1 , 2 , , l , the raw keys are M a b i and M b a i , the error vectors of the main channel and the eavesdropper’s channel are E a b i , E b a i , E a e i , and E b e i . E b a 0 denotes the error vector of the main channel and E b e 0 denotes the error vector of the eavesdropper’s channel. The superscript 0 represents the process where Bob sends a random sequence Q to Alice and i represents that a raw key M is transmitted in the i-th round. The subscripts a b , b a and a e , b e denote sequences transmitted from Alice to Bob, from Bob to Alice and sequences wiretapped from Alice to Eve, and from Bob to Eve. We assume that the length of each sequence is n, so that the received sequences of Alice and Eve are
T 1 = E b a 0 Q ,
T A 1 = E b e 0 Q ,
respectively, where the binary operator ⊕ denotes exclusive OR (XOR) operation [20]. Then, Alice uses the received sequence T 1 to calculate
U 1 = T 1 M a b 1 .
Alice transmits U 1 to Bob through the main channel and Eve may wiretap this U 1 through the eavesdropper’s channel. Bob and Eve can receive the noisy version of U 1 , respectively, as
V 1 = U 1 E a b 1 ,
W 1 = U 1 E a e 1 .
Since Bob knows the random sequence Q, he can XOR Q to U as
M ¯ a b 1 = V 1 Q = M a b 1 E b a 0 E a b 1 .
Eve only knows T A 1 , which is the noisy version of Q, and she can only XOR T A 1 to W 1 as
Z a e 1 = W 1 T A 1 = M a b 1 E b a 0 E b e 0 E a e 1 .
As shown in Figure 3, the raw key M is transmitted unidirectionally from Alice to Bob in the original TWWC. By comparing M ¯ a b 1 and Z a e 1 , Eve has one more noisy term than Bob. Therefore, as long as the main channel is not worse than the passive eavesdropper’s channel (the weight of E b a 0 is not higher than that of E b e 0 and E a e 1 ), it is guaranteed that Eve is unable to arrive at the same sequence as Alice and Bob. Alice and Bob can use any reconciliation scheme and privacy amplification function to transform the raw key M ¯ a b 1 and Z a e 1 into a much shorter secret key. Because of her errors, Eve is unable to predict Alice’s or Bob’s output of the privacy amplification. Finally, the secret key would be used as a one-time pad to ensure information-theoretic security between Alice and Bob. Furthermore, it is easy to see that this SKA is unidirectional from Alice to Bob. If Bob wants to send raw keys to Alice, they need another secure transmission with their roles exchanged.

2.2. Transmission Rate

Following the literature [3], we denote η as the transmission rate of the AD scheme. Let L M be the number of raw keys, and L Q be the number of random sequences. Then, the transmission rate is calculated as
η = L M L M + L Q .
Following the definition, the transmission rate η u n i of the original unidirectional TWC scheme is
η u n i = n n + n = 1 2 .

3. Bidirectional Secret-Key Agreement

If we use the above TWWC for AD in SKA, the raw keys are unidirectionally transmitted from Alice to Bob and the transmission rate η u n i is just 1 2 . In order to increase the transmission rate of the SKA, we modify the original unidirectional TWWC to a bidirectional TWWC for the AD step of the SKA between Alice and Bob.

3.1. Proposed Advantage Distillation scheme

Assuming that there are l rounds of SKA between Alice and Bob, the first round of the proposed bidirectional AD scheme is as follows.

3.1.1. Preprocessing

Bob sends a random sequence Q, Q = ( q 0 , q 1 , , q n 1 ) to Alice. The received sequences by Alice and Eve, respectively, are
T 1 = Q E b a 0 ,
T A 1 = Q E b e 0 ,
where T 1 = ( t 0 1 , t 1 1 , , t n 1 1 ) , t k 1 = q k e b a k 0 and T A 1 = ( t a 0 1 , t a 1 1 , , t a n 1 1 ) , t a k 1 = q k e b e k 0 , 0 k n 1 .

3.1.2. SKA from Alice to Bob

(A1. 1)
Alice uses the received sequence T 1 to calculate
U 1 = T 1 M a b 1 ,
where U 1 = ( u 0 1 , u 1 1 , , u n 1 1 ) , u k 1 = t k 1 m a b k 1 . Alice sends U 1 over the main channel and Eve wiretaps U 1 through the eavesdropper’s channel.
(A1. 2)
Bob and Eve receive the noisy version of U 1 as V 1 and W 1 , respectively, as
V 1 = U 1 E a b 1 = M a b 1 Q E b a 0 E a b 1 ,
W 1 = U 1 E a e 1 = M a b 1 Q E b a 0 E a e 1 .
(A1. 3)
Bob knows Q, so he can XOR Q to V 1 as
M ¯ a b 1 = V 1 Q = M a b 1 E b a 0 E a b 1 ,
where M ¯ a b 1 = ( m ¯ a b 0 1 , m ¯ a b 1 1 , , m ¯ a b n 1 1 ) is the received raw key. Eve only knows the noisy version of Q, which is T A 1 . Therefore, she can only XOR T A 1 to W 1 as
Z a e 1 = W 1 T A 1 = M a b 1 E b a 0 E b e 0 E a e 1 ,
where Z a e 1 = ( z a e 0 1 , z a e 1 1 , , z a e n 1 1 ) in the eavesdropped raw key.

3.1.3. SKA from Bob to Alice

(B1. 1)
Before Bob sends the raw key M b a 1 to Alice, he has to make
T 2 = V 1 .
Then, we can calculate
U 2 = T 2 M b a 1
and send U 2 to Alice through the main channel when Eve wiretaps it via the eavesdropper’s channel.
(B1. 2)
In this step, when Bob transmits the sequence U 2 to Alice, the noise of the two channels are E b a 1 and E b e 1 , respectively. Both Alice and Eve receive a noisy version of U 2 as V 2 and W 2 :
V 2 = U 2 E b a 1 = M b a 1 U 1 E a b 1 E b a 1 ,
W 2 = U 2 E b e 1 = M b a 1 U 1 E a b 1 E b e 1 .
(B1. 3)
Alice has the knowledge of U 1 and Eve has the knowledge of W 2 , therefore Alice can obtain the intended raw key by
M ¯ b a 1 = V 2 U 1 = M b a 1 E a b 1 E b a 1
and Eve can obtain the intended sequence by
Z b e 1 = W 2 W 1 = M b a 1 E a b 1 E a e 1 E b e 1 .
Step A1 and Step B1 correspond to the first round of our proposed bidirectional AD scheme for SKA, which is shown in Figure 4. Note that Steps A1.1–A1.3 provide raw keys M a b 1 and M ¯ a b 1 ; we can do the reconciliation to correct errors between M a b 1 and M ¯ a b 1 and do the privacy amplification to get the secret keys shared between Alice and Bob. Similarly, Steps B1.1–B1.3 provide raw keys M b a 1 and M ¯ b a 1 , based on which we can also do the reconciliation and privacy amplification steps and obtain secret keys between Alice and Bob.
Let us define L M i as the number of the raw keys, L Q as the number of the random sequence Q. Then, the transmission rate η b i i of the proposed bidirectional AD over i round is
η b i i = L M i L M i + L Q .
For example, for i = 1 , 2 , η b i 1 and η b i 2 equals to 2 3 and 4 5 , respectively. However, for a large number of rounds, such as l = 100 , η b i 100 almost equals to 1. Now, let us analyze the error probability of the main and eavesdropper’s channels in the following theorem.
Theorem 1.
Let the error probability of E b a i and E a b i be denoted as Pr ( e b a k i = 1 ) = Pr ( e a b k i = 1 ) = α and the error probability of E b e i and E a e i be denoted as Pr ( e b e k i = 1 ) = Pr ( e a e k i = 1 ) = β . After a round of the bidirectional TWC, the bit error probability of the main channel is 2 α ( 1 α ) , and the bit error probability of the eavesdropper’s channel is α ( 1 β ) 2 + 2 ( 1 α ) ( 1 β ) β + α β 2 .
Proof. 
Since Bob receives M ¯ a b 1 = M a b 1 E b a 0 E a b 1 and the raw key is M a b 1 , the bit error probability of raw key M a b 1 is
Pr ( m ¯ a b k 1 m a b k 1 ) = Pr ( e b a k 0 = 1 ) Pr ( e a b k 1 = 0 ) + Pr ( e b a k = 0 ) Pr ( e a b k 1 = 1 ) = α ( 1 α ) + ( 1 α ) α = 2 α ( 1 α ) .
Since Eve only has Z a e 1 = M a b 1 E b a 0 E b e 0 E a e 1 , her bit error probability is
Pr ( z a e k 1 m a b k 1 ) = Pr ( e b a k 0 = 1 ) Pr ( e b e k 0 = 0 ) Pr ( e a e k 1 = 0 ) + Pr ( e b a k 0 = 0 ) Pr ( e b e k 0 = 1 ) Pr ( e a e k 1 = 0 ) + Pr ( e b a k 0 = 0 ) Pr ( e b e k 0 = 0 ) Pr ( e a e k 1 = 1 ) + Pr ( e b a k 0 = 1 ) Pr ( e b e k 0 = 1 ) Pr ( e a e k 1 = 1 ) = α ( 1 β ) ( 1 β ) + ( 1 α ) β ( 1 β ) + ( 1 α ) ( 1 β ) β + α β β = α ( 1 β ) 2 + 2 ( 1 α ) ( 1 β ) β + α β 2 .
 ☐
Let C m and C w , p m = 2 α ( 1 α ) , and p w = α ( 1 β ) 2 + 2 ( 1 α ) ( 1 β ) β + α β 2 denote the capacity of the main channel and eavesdropper’s channel, bit error probability of main channel and eavesdropper’s channel, respectively. Assuming α = β , the BER of the main channel and the eavesdropper’s channel are summarized in Table 2. We can also receive the secret-key capacity C s ,
C s = C m C w = ( 1 H b ( p m ) ) ( 1 H b ( p w ) ) ,
where H b ( p ) is the binary entropy function. Assuming α = β , p ( m a b k 1 = 1 ) = p ( m a b k 1 = 0 ) = 1 2 . Then, we can obtain
C s = ( 1 p m log 2 1 p m + ( 1 p m ) log 2 1 1 p m ) ( 1 p w log 2 1 p w + ( 1 p w ) log 2 1 1 p w ) = ( 2 α 2 α 2 ) log 2 ( 2 α 2 α 2 ) + 1 2 log 2 ( 1 2 α + 2 α 2 ) ( 3 α 6 α 2 + 4 α 3 ) log 2 ( 3 α 6 α 2 + 4 α 3 ) 1 2 log 2 ( 1 3 α + 6 α 2 4 α 3 ) .
For the varying α and β , the corresponding C m , C w and C s are summarized in Table 3.

4. Multiple Rounds of Secret-Key Agreement

Assume that there are l rounds of SKA. Then, the ith round of bidirectional AD (shown in Figure 5) is as follows.

4.1. SKA from Alice to Bob

(A2. 1)
Let
T 2 i 1 = V 2 i 2 .
Then, Alice sends the raw key M a b i to Bob by
U 2 i 1 = T 2 i 1 M a b i .
(A2. 2)
Bob and Eve can receive the noisy version of U 2 i 1 as
V 2 i 1 = U 2 i 1 E a b i = M a b i U 2 i 2 E b a i 1 E a b i ,
W 2 i 1 = U 2 i 1 E a e i = M a b i U 2 i 2 E b a i 1 E a e i .
(A2. 3)
Bob and Eve have the knowledge of U 2 i 2 and W 2 i 2 . Therefore, they can obtain the noisy version of M a b i by XOR U 2 i 2 and W 2 i 2 to V 2 i 1 and W 2 i 1 , respectively. The result is calculated as
M ¯ a b i = V 2 i 1 U 2 i 2 = M a b i E b a i 1 E a b i
and
Z a e i = W 2 i 1 W 2 i 2 = M a b i E b a i 1 E b e i 1 E a e i .

4.2. SKA from Bob to Alice

(B2. 1)
In the i-th round, Bob has to make
T 2 i = V 2 i 1 .
Then, he sends the raw key M b a i in the noisy form, which is
U 2 i = T 2 i M b a i ,
over the main channel. Meanwhile, Eve may wiretap it by the eavesdropper’s channel.
(B2. 2)
Alice can receive V 2 i , consisting of the noisy vector E b a i and U 2 i , and Eve can receive W 2 i , which consists of the noisy vector E b e i and U 2 i ,
V 2 i = U 2 i E b a i = M b a i U 2 i 1 E a b i E b a i ,
W 2 i = U 2 i E b e i = M b a i U 2 i 1 E a b i E b e i .
(B2. 3)
Alice and Eve have the knowledge of U 2 i 1 and W 2 i 1 , respectively. Therefore, they can obtain the noisy version of M b a i by XOR U 2 i 1 and W 2 i 1 to (36) and (37). The M ¯ b a i and Z b e i can be received by
M ¯ b a i = V 2 i U 2 i 1 = M b a i E a b i E b a i ,
and
Z b e i = W 2 i W 2 i 1 = M b a i E a b i E a e i E b e i .
As shown in Figure 6, the secret sequence M is transmitted bidirectionally between Alice and Bob in our proposed scheme. The BER of the main channel and eavesdropper’s channel in the i-th round is the same as that of the first round. Transmission rate after l rounds of the proposed AD is
η b i l = 2 l 1 2 l ,
which is close to 1 when l is large enough.

5. Bidirectional Secret-Key Agreement over AWGN Channel

Now, let us demonstrate the proposed AD scheme over the AWGN channel. Assume that there are l rounds of SKA over AWGN channel as well. Then, the i-th round shown in Figure 7 is as follows.

5.1. SKA from Alice to Bob

(A3. 1)
Let
T 2 i 1 = V 2 i 2 .
Then, Alice sends the raw key M a b i to Bob by
U 2 i 1 = T 2 i 1 + M a b i ,
where ( U 1 , U 2 , ⋯, U 2 l ) ( + 1 , 1 )
(A3. 2)
Bob and Eve can receive the noisy version of U 2 i 1 as
V 2 i 1 = U 2 i 1 + n a b i = M a b i + U 2 i 2 + n b a i 1 + n a b i ,
W 2 i 1 = U 2 i 1 + n a e i = M a b i + U 2 i 2 + n b a i 1 + n a e i ,
where the variance of AWGN over the main channel and the eavesdropper’s channel are σ m 2 and σ w 2 , respectively.
(A3. 3)
Bob and Eve can obtain the noisy version of M a b i by minusing U 2 i 2 and W 2 i 2 to V 2 i 1 and W 2 i 1 , respectively. The result will be
M ¯ a b i = V 2 i 1 + U 2 i 2 = M a b i + n b a i 1 + n a b i
and
Z a e i = W 2 i 1 + W 2 i 2 = M a b i + n b a i 1 + n b e i 1 + n a e i ,
where the variance of AWGN n b e or n a e is σ w 2 .

5.2. SKA from Bob to Alice

(B3. 1)
In the ith round, Bob has to make
T 2 i = V 2 i 1 .
Then, he sends the raw key M b a i in the noisy form, which is
U 2 i = T 2 i + M b a i
over the main channel.
(B3. 2)
Alice can receive V 2 i , consisting of the noisy vector E b a i and U 2 i , and Eve can receive W 2 i , which consists of the noisy vector E b e i and U 2 i ,
V 2 i = U 2 i + n b a i = M b a i + U 2 i 1 + n a b i + n b a i ,
W 2 i = U 2 i + n b e i = M b a i + U 2 i 1 + n a b i + n b e i .
(B3. 3)
Alice and Eve can obtain the noisy version of M b a i by minusing U 2 i 1 and W 2 i 1 to (48) and (49). M ¯ b a i and Z b e i can be received by
M ¯ b a i = V 2 i + U 2 i 1 = M b a i + n a b i + n b a i ,
and
Z b e i = W 2 i + W 2 i 1 = M b a i + n a b i + n a e i + n b e i .
Now, let us calculate the capacity of the main channel and the eavesdropper’s channel by C m and C w . Because the variance of the main channel and the eavesdropper’s channel are σ m and σ w , we can calculate
C m = 1 2 log 2 ( 1 + P σ m 2 + σ m 2 ) = 1 2 log 2 ( 1 + P 2 σ m 2 ) ,
and
C w = 1 2 log 2 ( 1 + P σ m 2 + σ w 2 + σ w 2 ) = 1 2 log 2 ( 1 + P 2 σ m 2 + σ w 2 ) .
We can also receive the secret-key capacity C s over it.
C s = C m C w = 1 2 [ log 2 ( 1 + P 2 σ m 2 ) log 2 ( 1 + P 2 σ m 2 + σ w 2 ) ] .

6. Performance Analysis

In this section, we evaluate performance of the proposed AD scheme over BSC channel in terms of BER and C s and performance of the proposed AD scheme over AWGN channel C s . The length n of raw key M i is 10,000. BER simulation results are shown in Figure 8. With the increasing crossover probability p, the BER increases as well. This indicates that performance of the main channel between Alice and Bob is superior to that of the eavesdropper’s channel under the same number l of rounds and length n of the secret sequence.
We also show the capacity of main channel, eavesdropper’s channel, and the difference between them that is secret-key capacity over BSC channel in Figure 9 and over AWGN channel in Figure 10. Assuming that α = β 0.09 , the secret-key capacity increases as α and β increase. However, when α = β 0.1 , the secret-key capacity decreases with the increase of α and β . In the AWGN channel, the C s is close to 0.3 when the signal-to-noise ratio (SNR) is from 0 to 50.
Comparing to the AD schemes using the original two-way wiretap channel, the advantage of our scheme is that we need fewer rounds of communication between Alice and Bob to obtain the same amount of keys. Furthermore, since we need fewer rounds of communication, we also need less XOR operations to obtain the same amount of keys. In each round of the unidirectional AD scheme, using the original two-way wiretap channel, Alice and Bob need 1 XOR operation, respectively, in (3) and (6). In each round of the proposed bidirectional AD scheme, Alice needs 2 operations in (12) and (21), and Bob needs 2 operations in (15) and (18). Therefore, in each round of the proposed bidirectional AD scheme, the number of XOR operations is two times higher than that in the unidirectional AD scheme. However, our bidirectional scheme also has a transmission rate of secret keys which is two times greater than that of the unidirectional AD scheme. Therefore, our scheme needs the same number of XOR operations to obtain the same amount of secret keys as the unidirectional AD scheme. We have listed the transmission rate, XOR operations of the unidirectional AD scheme and the proposed bidirectional AD in Table 4.

7. Conclusions

In this paper, we modified the original unidirectional TWWC to a bidirectional TWWC for the AD step of the SKA between Alice and Bob over BSC channel and AWGN channel. The proposed bidirectional secret-key agreement can be used to distribute keys between Alice and Bob and its transmission rate is better than the secret-key agreement of unidirectional TWWC. The BER and capacity were calculated first, and then we evaluated the performance of the proposed AD scheme in terms of BER over BSC channel and secret-key capacity over both channels. The BER of the main channel is lower than the eavesdropper’s channel, and analysis of the transmission rate is nearly 1 when the number of rounds is large. Moreover, The secret-key capacity C s is from 0.04 to 0.1 as the error probability of channel is from 0.01 to 0.15 in the BSC channel. In the AWGN channel, the secret-key capacity is close to 0.3 as the SNR increases.

Acknowledgments

This work was supported by the National Natural Science Foundation of China (61671143,61571315,61631004), Shanghai Rising-Star Program (15QA1400100), Key Accident Prevention Technology Project for State Administration of Work Safety (zhishu-0016-2017AQ) and Langfang Research and Development Program about Science & Technology (2016011034).

Author Contributions

Xue-Qin Jiang proposed the new AD scheme; Hui-Ming Wang analyzed the secret-key capacity; Jia hou designed all the simulations; Yi Yang performed the simulations; Yan Feng wrote the paper. All authors have read and approved the final manuscript.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Vernam, G.S. Cipher printing telegraph systems for secret wire and radio telegraphic communications. Trans. Am. Inst. Electr. Eng. 1926, 45, 295–301. [Google Scholar] [CrossRef]
  2. Shannon, C.E. Communication theory of secrecy systems. Bell Syst. Tech. J. 1949, 28, 656–715. [Google Scholar] [CrossRef]
  3. Tomasin, S. Secret key agreement by LLR thresholding and syndrome feedback over awgn channel. IEEE Commun. Lett. 2014, 18, 26–29. [Google Scholar] [CrossRef]
  4. Cao, Y.; Jiang, X.Q.; Wang, H.M.; Bai, E.; Li, J. Advantage distillation over MIMO wiretap channels based on generalized extended orthogonal space-time block codes. In Proceedings of the 2016 International Conference on Computer, Information and Telecommunication Systems (CITS), Kunming, China, 6–8 July 2016; pp. 1–5. [Google Scholar]
  5. Maurer, U. Secret key agreement by public discussion from common information. IEEE Trans. Inf. Theory 1993, 39, 733–742. [Google Scholar] [CrossRef]
  6. Csiszar, I.; Narayan, P. Common randomness and secret key generation with a helper. IEEE Trans. Inf. Theory 2000, 46, 344–366. [Google Scholar] [CrossRef]
  7. Csiszar, I.; Narayan, P. Secrecy capacities for multiterminal channel Models. IEEE Trans. Inf. Theory 2008, 54, 2437–2452. [Google Scholar] [CrossRef]
  8. Watanabe, S.; Oohama, Y. Secret key agreement from vector Gaussian sources by rate limited public communication. Proc. IEEE Int. Symp. Inf. Theory 2010, 93, 2597–2601. [Google Scholar]
  9. Nitinawarat, S.; Narayan, P. Secret key generation for correlated Gaussian sources. IEEE Trans. Inf. Theory 2012, 58, 3373–3391. [Google Scholar] [CrossRef]
  10. Ahlswede, R.; Csiszar, I. Common randomness in information theory and cryptography-Part I: Secret sharing. IEEE Trans. Inf. Theory 1993, 39, 1121–1132. [Google Scholar] [CrossRef]
  11. Naito, M.; Watanabe, S.; Matsumoto, R.; Uyematsu, T. Secret key agreement by soft-decision of signals in Gaussian Maurer’s model. IEICE Trans. Fundam. 2009, 92, 525–534. [Google Scholar] [CrossRef]
  12. Bloch, M.; Barros, J.; Rodriguez, M.R.D.; McLaughlin, S.W. Wireless information-theoretic security. IEEE Trans. Inf. Theory 2008, 54, 2515–2534. [Google Scholar] [CrossRef]
  13. Kobara, K.; Morozov, K.; Imai, H. On the possibility of key agreement using variable directional antenna. In Proceedings of the 1st Joint Workshop on Information Security, Seoul, Korea, 20–21 September 2006; pp. 1432–1436. [Google Scholar]
  14. Aono, T.; Higuchi, K.; Ohira, T.; Komiyama, B.; Sasaoka, H. Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels. IEEE Trans. Antennas Propag. 2005, 53, 3776–3784. [Google Scholar] [CrossRef]
  15. Ye, C.; Mathur, S.; Reznik, A.; Shah, Y.; Trappe, W.; Mandayam, N.B. Information-theoretically secret key generation for fading wireless channels. IEEE Trans. Inf. Forensics Secur. 2010, 5, 240–254. [Google Scholar]
  16. Isaka, M.; Kawata, S. Signal sets for secret key agreement with public discussion based on Gaussian and fading channels. IEEE Trans. Inf. Forensics Secur. 2011, 6, 523–531. [Google Scholar] [CrossRef]
  17. Wyner, A.D. The wire-tap channel. Bell Syst. Tech. J. 1975, 54, 1355–1387. [Google Scholar] [CrossRef]
  18. Wen, H.; Gong, G.; Ho, P.H. Build-in wiretap channel I with feedback and LDPC codes. J. Commun. Netw. 2009, 11, 538–643. [Google Scholar] [CrossRef]
  19. Bloch, M.; Barros, J. Physical-Layer Security: From Information Theory to Security Engineering; Cambridge University Press: Cambridge, UK, 2011. [Google Scholar]
  20. Pacher, C.; Grabenweger, P.; Martinez-Mateo, J.; Martin, V. An information reconciliation protocol for secret-key agreement with small leakage. In Proceedings of the 2015 IEEE International Symposium on Information Theory (ISIT), Hong Kong, China, 14–19 June 2015; pp. 730–734. [Google Scholar]
Figure 1. Block diagram of the secret key agreement (SKA) scheme.
Figure 1. Block diagram of the secret key agreement (SKA) scheme.
Entropy 19 00505 g001
Figure 2. Advantage Distillation Scheme based on the original two-way wiretap channel.
Figure 2. Advantage Distillation Scheme based on the original two-way wiretap channel.
Entropy 19 00505 g002
Figure 3. Original two-way wiretap channel.
Figure 3. Original two-way wiretap channel.
Entropy 19 00505 g003
Figure 4. First round of bidirectional secret-key agreement.
Figure 4. First round of bidirectional secret-key agreement.
Entropy 19 00505 g004
Figure 5. The i-th round of bidirectional secret-key agreement.
Figure 5. The i-th round of bidirectional secret-key agreement.
Entropy 19 00505 g005
Figure 6. Proposed bidirectional advantage distillation scheme.
Figure 6. Proposed bidirectional advantage distillation scheme.
Entropy 19 00505 g006
Figure 7. The i-th round of bidirectional secret-key agreement over AWGN channel.
Figure 7. The i-th round of bidirectional secret-key agreement over AWGN channel.
Entropy 19 00505 g007
Figure 8. The BER performance of the main channel and eavesdropper’s channel over binary symmetric channel (BSC).
Figure 8. The BER performance of the main channel and eavesdropper’s channel over binary symmetric channel (BSC).
Entropy 19 00505 g008
Figure 9. The secret-key capacity and capacities of the main channel and eavesdropper’s channel over BSC channel.
Figure 9. The secret-key capacity and capacities of the main channel and eavesdropper’s channel over BSC channel.
Entropy 19 00505 g009
Figure 10. The secret-key capacity and capacities over additive white Gaussian noise (AWGN) channel.
Figure 10. The secret-key capacity and capacities over additive white Gaussian noise (AWGN) channel.
Entropy 19 00505 g010
Table 1. Symbols.
Table 1. Symbols.
SymbolsMeaning
M i raw keys
Qrandom sequence
E b a 0 noise vector from Bob to Alice over BSC channel
E b e 0 noise vector from Bob to Eve over BSC channel
E a b i noise vector from Alice to Bob over BSC channel
E b a i noise vector from Bob to Alice over BSC channel
E a e i noise vector from Alice to Eve over BSC channel
E b e i noise vector from Bob to Eve over BSC channel
T 1 noisy version of Q obtained by Alice
T A 1 noisy version of Q obtained by Eve
U i raw keys covered by T i
V i noisy version of U i obtained by Bob or Alice
T i equals to V i 1
W i noisy version of U i obtained by Eve
M ¯ a b 1 noisy version of raw keys obtained by Bob or Alice
Z a e 1 noisy version of raw keys obtained by Eve
L M number of raw keys M
L Q number of random sequence Q
α cross over probability between Alice and Bob
β cross over probability between legitimate users and Eve
n a b i noise vector from Alice to Bob over AWGN channel
n b a i noise vector from Bob to Alice over AWGN channel
n a e i noise vector from Alice to Eve over AWGN channel
n b e i noise vector from Bob to Eve over AWGN channel
C m capacity of the main channel
C w capacity of the eavesdropper’s channel
C s secret-key capacity
Table 2. Bit error rate (BER) of main channel and the eavesdropper’s channel.
Table 2. Bit error rate (BER) of main channel and the eavesdropper’s channel.
α = β 0.10.20.30.40.5
Main channel0.0930.1650.2160.2470.258
Eavesdropper’s channel0.2440.3920.4680.4960.499
Table 3. Channel capacity and secret-key capacity.
Table 3. Channel capacity and secret-key capacity.
α = β 0.010.020.030.040.05
C m 0.870.790.720.660.61
C w 0.830.720.630.560.50
C s 0.040.070.090.100.11
Table 4. Transmission rate number of XOR operations of different schemes with l rounds, l is large enough. TWWC: two-way wiretap channel.
Table 4. Transmission rate number of XOR operations of different schemes with l rounds, l is large enough. TWWC: two-way wiretap channel.
SchemeTransmission RateNumber of XOR Operations
Unidirectional TWWC scheme0.5 2 l
Bidirectional TWWC scheme1 4 l

Share and Cite

MDPI and ACS Style

Feng, Y.; Jiang, X.-Q.; Hou, J.; Wang, H.-M.; Yang, Y. An Efficient Advantage Distillation Scheme for Bidirectional Secret-Key Agreement. Entropy 2017, 19, 505. https://doi.org/10.3390/e19090505

AMA Style

Feng Y, Jiang X-Q, Hou J, Wang H-M, Yang Y. An Efficient Advantage Distillation Scheme for Bidirectional Secret-Key Agreement. Entropy. 2017; 19(9):505. https://doi.org/10.3390/e19090505

Chicago/Turabian Style

Feng, Yan, Xue-Qin Jiang, Jia Hou, Hui-Ming Wang, and Yi Yang. 2017. "An Efficient Advantage Distillation Scheme for Bidirectional Secret-Key Agreement" Entropy 19, no. 9: 505. https://doi.org/10.3390/e19090505

APA Style

Feng, Y., Jiang, X. -Q., Hou, J., Wang, H. -M., & Yang, Y. (2017). An Efficient Advantage Distillation Scheme for Bidirectional Secret-Key Agreement. Entropy, 19(9), 505. https://doi.org/10.3390/e19090505

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop