{"title":"一种高效的无信标随机噪声密钥协议","authors":"Albert Guan","doi":"10.1080/23799927.2019.1671903","DOIUrl":null,"url":null,"abstract":"ABSTRACT Computationally lightweight and unconditionally secure key agreement protocols are very useful for secure communication in public networks, especially for sensors with limited computing resources. In 2017, Guan and Tseng proposed a key agreement protocol which is computationally lightweight and unconditionally secure. In their protocol, it was assumed that the two communicating nodes can receive random bit string from a beacon node. Random bit string plays an important role in the generation of secret keys. With the advancement of hardware and software technologies, sensors may be able to generate good random strings. In this paper, we consider the case that the sensor nodes can generate random bit strings for secret keys. Therefore, no beacon nodes are required. The results of this study show that a key agreement protocol can be much more effective and efficient in the case that the communicating nodes can generate good random bit strings.","PeriodicalId":37216,"journal":{"name":"International Journal of Computer Mathematics: Computer Systems Theory","volume":null,"pages":null},"PeriodicalIF":0.9000,"publicationDate":"2019-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/23799927.2019.1671903","citationCount":"0","resultStr":"{\"title\":\"An efficient secret key agreement protocol based on random noise without beacons\",\"authors\":\"Albert Guan\",\"doi\":\"10.1080/23799927.2019.1671903\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"ABSTRACT Computationally lightweight and unconditionally secure key agreement protocols are very useful for secure communication in public networks, especially for sensors with limited computing resources. In 2017, Guan and Tseng proposed a key agreement protocol which is computationally lightweight and unconditionally secure. In their protocol, it was assumed that the two communicating nodes can receive random bit string from a beacon node. Random bit string plays an important role in the generation of secret keys. With the advancement of hardware and software technologies, sensors may be able to generate good random strings. In this paper, we consider the case that the sensor nodes can generate random bit strings for secret keys. Therefore, no beacon nodes are required. The results of this study show that a key agreement protocol can be much more effective and efficient in the case that the communicating nodes can generate good random bit strings.\",\"PeriodicalId\":37216,\"journal\":{\"name\":\"International Journal of Computer Mathematics: Computer Systems Theory\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.9000,\"publicationDate\":\"2019-10-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://sci-hub-pdf.com/10.1080/23799927.2019.1671903\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Computer Mathematics: Computer Systems Theory\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1080/23799927.2019.1671903\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"COMPUTER SCIENCE, THEORY & METHODS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Computer Mathematics: Computer Systems Theory","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1080/23799927.2019.1671903","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, THEORY & METHODS","Score":null,"Total":0}
An efficient secret key agreement protocol based on random noise without beacons
ABSTRACT Computationally lightweight and unconditionally secure key agreement protocols are very useful for secure communication in public networks, especially for sensors with limited computing resources. In 2017, Guan and Tseng proposed a key agreement protocol which is computationally lightweight and unconditionally secure. In their protocol, it was assumed that the two communicating nodes can receive random bit string from a beacon node. Random bit string plays an important role in the generation of secret keys. With the advancement of hardware and software technologies, sensors may be able to generate good random strings. In this paper, we consider the case that the sensor nodes can generate random bit strings for secret keys. Therefore, no beacon nodes are required. The results of this study show that a key agreement protocol can be much more effective and efficient in the case that the communicating nodes can generate good random bit strings.