{"title":"基于速率分裂极化码的秘密密钥协议","authors":"Jiajia Wu , Ming Xu","doi":"10.1016/j.jisa.2025.104119","DOIUrl":null,"url":null,"abstract":"<div><div>In order to prevent illegal sensors from detecting the secret-key agreement process in the underwater acoustic channel (UAC), a covert secret-key agreement scheme based on rate-splitting polar code called RSPC is proposed. Firstly, a novel Bhattacharyya parameter is established and calculated by the transmitter for code construction according to the fading process of the UAC. The information set is then selected by sorting the reliability of the polarized sub-channels. Secondly, two independent codewords are obtained by the transmitter through rate-splitting and polar coding. Then, an UAC gain prediction algorithm is designed based on the first-order autoregressive model, Wiener–Khinchin theorem and Karush-Kuhn–Tucker (KKT) condition. Based on the rate-splitting and prediction algorithm, the index set of the polarized sub-channels is divided into a random set and a deterministic set, and the bitwise XOR operation is performed between the very high entropy bits of one codeword and the low entropy bits of the other codeword. This strategy improves the covertness of the codeword transmission in the UAC. According to the sensor-based observation and channel gain, the estimate of the codeword is obtained via successive cancellation decoding and the same secret-key can be extracted by the receiver. Finally, theoretical analyses are conducted on the reliability, covertness, and covert secret-key generation rate of the RSPC scheme. The simulation results show that compared with existing schemes, the RSPC scheme improves the above performance indicators by 21.26%, 47.19%, and 24.71%, respectively. Meanwhile, the secret-key generated by the RSPC scheme successfully passes the NIST randomness detection.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"93 ","pages":"Article 104119"},"PeriodicalIF":3.8000,"publicationDate":"2025-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Covert secret-key agreement based on rate-splitting polar code\",\"authors\":\"Jiajia Wu , Ming Xu\",\"doi\":\"10.1016/j.jisa.2025.104119\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>In order to prevent illegal sensors from detecting the secret-key agreement process in the underwater acoustic channel (UAC), a covert secret-key agreement scheme based on rate-splitting polar code called RSPC is proposed. Firstly, a novel Bhattacharyya parameter is established and calculated by the transmitter for code construction according to the fading process of the UAC. The information set is then selected by sorting the reliability of the polarized sub-channels. Secondly, two independent codewords are obtained by the transmitter through rate-splitting and polar coding. Then, an UAC gain prediction algorithm is designed based on the first-order autoregressive model, Wiener–Khinchin theorem and Karush-Kuhn–Tucker (KKT) condition. Based on the rate-splitting and prediction algorithm, the index set of the polarized sub-channels is divided into a random set and a deterministic set, and the bitwise XOR operation is performed between the very high entropy bits of one codeword and the low entropy bits of the other codeword. This strategy improves the covertness of the codeword transmission in the UAC. According to the sensor-based observation and channel gain, the estimate of the codeword is obtained via successive cancellation decoding and the same secret-key can be extracted by the receiver. Finally, theoretical analyses are conducted on the reliability, covertness, and covert secret-key generation rate of the RSPC scheme. The simulation results show that compared with existing schemes, the RSPC scheme improves the above performance indicators by 21.26%, 47.19%, and 24.71%, respectively. Meanwhile, the secret-key generated by the RSPC scheme successfully passes the NIST randomness detection.</div></div>\",\"PeriodicalId\":48638,\"journal\":{\"name\":\"Journal of Information Security and Applications\",\"volume\":\"93 \",\"pages\":\"Article 104119\"},\"PeriodicalIF\":3.8000,\"publicationDate\":\"2025-06-13\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Information Security and Applications\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S2214212625001565\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Information Security and Applications","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2214212625001565","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
Covert secret-key agreement based on rate-splitting polar code
In order to prevent illegal sensors from detecting the secret-key agreement process in the underwater acoustic channel (UAC), a covert secret-key agreement scheme based on rate-splitting polar code called RSPC is proposed. Firstly, a novel Bhattacharyya parameter is established and calculated by the transmitter for code construction according to the fading process of the UAC. The information set is then selected by sorting the reliability of the polarized sub-channels. Secondly, two independent codewords are obtained by the transmitter through rate-splitting and polar coding. Then, an UAC gain prediction algorithm is designed based on the first-order autoregressive model, Wiener–Khinchin theorem and Karush-Kuhn–Tucker (KKT) condition. Based on the rate-splitting and prediction algorithm, the index set of the polarized sub-channels is divided into a random set and a deterministic set, and the bitwise XOR operation is performed between the very high entropy bits of one codeword and the low entropy bits of the other codeword. This strategy improves the covertness of the codeword transmission in the UAC. According to the sensor-based observation and channel gain, the estimate of the codeword is obtained via successive cancellation decoding and the same secret-key can be extracted by the receiver. Finally, theoretical analyses are conducted on the reliability, covertness, and covert secret-key generation rate of the RSPC scheme. The simulation results show that compared with existing schemes, the RSPC scheme improves the above performance indicators by 21.26%, 47.19%, and 24.71%, respectively. Meanwhile, the secret-key generated by the RSPC scheme successfully passes the NIST randomness detection.
期刊介绍:
Journal of Information Security and Applications (JISA) focuses on the original research and practice-driven applications with relevance to information security and applications. JISA provides a common linkage between a vibrant scientific and research community and industry professionals by offering a clear view on modern problems and challenges in information security, as well as identifying promising scientific and "best-practice" solutions. JISA issues offer a balance between original research work and innovative industrial approaches by internationally renowned information security experts and researchers.