{"title":"二进制信道中密钥的无条件信息论安全性","authors":"Kexin Wang , Jian Zhang , Gang Xin , Xingyu Xiao","doi":"10.1016/j.phycom.2025.102854","DOIUrl":null,"url":null,"abstract":"<div><div>We consider the problem of the secret key rate in the modified Maurer’s model. The modified model accounts for the noise generated by the source, aligning more closely with realistic scenarios. All receivers receive broadcast signals through binary channels. Unlike Maurer’s model, the bit error rate (BER) of the binary channels in the modified model is correlated because the channels share a partial common noise source. First, we demonstrate that in the case of using the repeat-code protocol, regardless of the channel quality of the eavesdropper Eve, as long as the block length is large enough, the legitimate receivers Alice and Bob can achieve a positive secret key rate. In addition, the block length required to achieve a positive secret key rate is determined, and the lower bound of the secret key rate is given. Next, the upper bound of the secret key rate, i.e., conditional mutual information, is analyzed with the change in Eve’s channel quality. We show that the conditional mutual information decreases by <span><math><mrow><mn>1</mn><mo>/</mo><mfenced><mrow><mn>1</mn><mo>+</mo><msub><mrow><mi>s</mi></mrow><mrow><mi>Z</mi></mrow></msub></mrow></mfenced></mrow></math></span> as Eve’s signal-to-noise ratio <span><math><msub><mrow><mi>s</mi></mrow><mrow><mi>Z</mi></mrow></msub></math></span> increases, but it remains positive even though the channel noise of Eve is zero.</div></div>","PeriodicalId":48707,"journal":{"name":"Physical Communication","volume":"73 ","pages":"Article 102854"},"PeriodicalIF":2.2000,"publicationDate":"2025-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Unconditional information-theoretic security of secret keys in binary channels\",\"authors\":\"Kexin Wang , Jian Zhang , Gang Xin , Xingyu Xiao\",\"doi\":\"10.1016/j.phycom.2025.102854\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>We consider the problem of the secret key rate in the modified Maurer’s model. The modified model accounts for the noise generated by the source, aligning more closely with realistic scenarios. All receivers receive broadcast signals through binary channels. Unlike Maurer’s model, the bit error rate (BER) of the binary channels in the modified model is correlated because the channels share a partial common noise source. First, we demonstrate that in the case of using the repeat-code protocol, regardless of the channel quality of the eavesdropper Eve, as long as the block length is large enough, the legitimate receivers Alice and Bob can achieve a positive secret key rate. In addition, the block length required to achieve a positive secret key rate is determined, and the lower bound of the secret key rate is given. Next, the upper bound of the secret key rate, i.e., conditional mutual information, is analyzed with the change in Eve’s channel quality. We show that the conditional mutual information decreases by <span><math><mrow><mn>1</mn><mo>/</mo><mfenced><mrow><mn>1</mn><mo>+</mo><msub><mrow><mi>s</mi></mrow><mrow><mi>Z</mi></mrow></msub></mrow></mfenced></mrow></math></span> as Eve’s signal-to-noise ratio <span><math><msub><mrow><mi>s</mi></mrow><mrow><mi>Z</mi></mrow></msub></math></span> increases, but it remains positive even though the channel noise of Eve is zero.</div></div>\",\"PeriodicalId\":48707,\"journal\":{\"name\":\"Physical Communication\",\"volume\":\"73 \",\"pages\":\"Article 102854\"},\"PeriodicalIF\":2.2000,\"publicationDate\":\"2025-09-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Physical Communication\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S1874490725002575\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"ENGINEERING, ELECTRICAL & ELECTRONIC\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Physical Communication","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1874490725002575","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
Unconditional information-theoretic security of secret keys in binary channels
We consider the problem of the secret key rate in the modified Maurer’s model. The modified model accounts for the noise generated by the source, aligning more closely with realistic scenarios. All receivers receive broadcast signals through binary channels. Unlike Maurer’s model, the bit error rate (BER) of the binary channels in the modified model is correlated because the channels share a partial common noise source. First, we demonstrate that in the case of using the repeat-code protocol, regardless of the channel quality of the eavesdropper Eve, as long as the block length is large enough, the legitimate receivers Alice and Bob can achieve a positive secret key rate. In addition, the block length required to achieve a positive secret key rate is determined, and the lower bound of the secret key rate is given. Next, the upper bound of the secret key rate, i.e., conditional mutual information, is analyzed with the change in Eve’s channel quality. We show that the conditional mutual information decreases by as Eve’s signal-to-noise ratio increases, but it remains positive even though the channel noise of Eve is zero.
期刊介绍:
PHYCOM: Physical Communication is an international and archival journal providing complete coverage of all topics of interest to those involved in all aspects of physical layer communications. Theoretical research contributions presenting new techniques, concepts or analyses, applied contributions reporting on experiences and experiments, and tutorials are published.
Topics of interest include but are not limited to:
Physical layer issues of Wireless Local Area Networks, WiMAX, Wireless Mesh Networks, Sensor and Ad Hoc Networks, PCS Systems; Radio access protocols and algorithms for the physical layer; Spread Spectrum Communications; Channel Modeling; Detection and Estimation; Modulation and Coding; Multiplexing and Carrier Techniques; Broadband Wireless Communications; Wireless Personal Communications; Multi-user Detection; Signal Separation and Interference rejection: Multimedia Communications over Wireless; DSP Applications to Wireless Systems; Experimental and Prototype Results; Multiple Access Techniques; Space-time Processing; Synchronization Techniques; Error Control Techniques; Cryptography; Software Radios; Tracking; Resource Allocation and Inference Management; Multi-rate and Multi-carrier Communications; Cross layer Design and Optimization; Propagation and Channel Characterization; OFDM Systems; MIMO Systems; Ultra-Wideband Communications; Cognitive Radio System Architectures; Platforms and Hardware Implementations for the Support of Cognitive, Radio Systems; Cognitive Radio Resource Management and Dynamic Spectrum Sharing.