Physical layer security for next generation wireless networks: Theories, technologies, and challenges

Y Liu, HH Chen, L Wang - IEEE Communications Surveys & …, 2016 - ieeexplore.ieee.org
Physical layer security (PHY-security) takes the advantages of channel randomness nature
of transmission media to achieve communication confidentiality and authentication. Wiretap …

Fast and scalable secret key generation exploiting channel phase randomness in wireless networks

Q Wang, H Su, K Ren, K Kim - 2011 Proceedings IEEE …, 2011 - ieeexplore.ieee.org
Recently, there has been great interest in physical layer security techniques that exploit the
randomness of wireless channels for securely extracting cryptographic keys. Several …

Secret key generation exploiting channel characteristics in wireless communications

K Ren, H Su, Q Wang - IEEE Wireless Communications, 2011 - ieeexplore.ieee.org
Due to the broadcast nature of wireless channels, wireless communication is vulnerable to
eavesdrop**, message modification, and node impersonation. Securing the wireless …

Leakage-resilient public-key cryptography in the bounded-retrieval model

J Alwen, Y Dodis, D Wichs - Advances in Cryptology-CRYPTO 2009: 29th …, 2009 - Springer
We study the design of cryptographic primitives resilient to key-leakage attacks, where an
attacker can repeatedly and adaptively learn information about the secret key, subject only …

Reusable fuzzy extractors for low-entropy distributions

R Canetti, B Fuller, O Paneth, L Reyzin, A Smith - Journal of Cryptology, 2021 - Springer
Fuzzy extractors (Dodis et al., in Advances in cryptology—EUROCRYPT 2014, Springer,
Berlin, 2014, pp 93–110) convert repeated noisy readings of a secret into the same …

Two source extractors for asymptotically optimal entropy, and (many) more

X Li - 2023 IEEE 64th Annual Symposium on Foundations of …, 2023 - ieeexplore.ieee.org
A long line of work in the past two decades or so established close connections between
several different pseudorandom objects and applications, including seeded or seedless non …

Position-based quantum cryptography: Impossibility and constructions

H Buhrman, N Chandran, S Fehr, R Gelles… - SIAM Journal on …, 2014 - SIAM
In this work, we study position-based cryptography in the quantum setting. The aim is to use
the geographical position of a party as its only credential. On the negative side, we show that …

Improved non-malleable extractors, non-malleable codes and independent source extractors

X Li - Proceedings of the 49th Annual ACM SIGACT …, 2017 - dl.acm.org
In this paper we give improved constructions of several central objects in the literature of
randomness extraction and tamper-resilient cryptography. Our main results are:(1) An …

Robust fuzzy extractors and authenticated key agreement from close secrets

Y Dodis, J Katz, L Reyzin, A Smith - … , California, USA, August 20-24, 2006 …, 2006 - Springer
Consider two parties holding correlated random variables W and W′, respectively, that are
within distance t of each other in some metric space. These parties wish to agree on a …

Computational fuzzy extractors

B Fuller, X Meng, L Reyzin - Information and computation, 2020 - Elsevier
Fuzzy extractors derive strong keys from noisy sources. Their security is usually defined
information-theoretically, with gaps between known negative results, existential …