[1] |
AHLSWEDE R , CSISZAR I . Common randomness in information theory and cryptography secret sharing[J]. IEEE Trans on Information Theory, 1993,39(4): 1121-1132.
|
[2] |
MAURER U M . Secret key agreement by public discussion from common information[J]. IEEE Trans on Information Theory, 1993,39(3): 733-742.
|
[3] |
HERSHEY J E , HASSAN A A , YARLAGADDA R . Unconventional cryptographic keying variable management[J]. IEEE Trans on Communication, 1995,43(1): 3-6.
|
[4] |
MATHUR S , TRAPPER W , MANDAYAM N ,et al. Radio-telepathy:extracting a secret key from an unauthenticated wireless channel[A]. Proc of the 14th ACM International Conf on Mobile Computing and Networking[C]. San Francisco,USA, 2008. 128-139.
|
[5] |
AONO T , HIGUCHI K , OHIRA T ,et al. Wireless secret key generation exploiting reactance domain scalar response of multipath fading channels[J]. IEEE Trans on Antennas and Propagation, 2005,53(11): 3776-3784.
|
[6] |
JANA S , PREMNATH N S , CLARK M ,et al. On the effectiveness of secret key extraction from wireless signal strength in real environments[A]. Proc of the 15th ACM Conf on Mobile Computing and Networking[C]. Beijing,China, 2009. 321-332.
|
[7] |
WILSON R , TSE D , SCHOLTZ R A . Channel identification:secret sharing using reciprocity in UWB channels[J]. IEEE Trans on Information Forensics and Security, 2007,9(3): 17-30.
|
[8] |
YE C , MATHUR S , REZNIK A ,et al. Information-theoretically secret key generation for fading wireless channels[J]. IEEE Trans on Information Forensics and Security, 2010,5(2): 240-254.
|
[9] |
SASAOKA H , IWAI H . Securing Wireless Communications at the Physical Layer[M]. Springer Publishing Company, 2010. 261-280.
|
[10] |
HAMIDA S , PIERROT J , CASTELLUCCIA C . An adaptive quantization algorithm for secret key generation using radio channel measurement[A]. The 3rd International Conf on New Technologies,Mobility and Security (NTMS)IEEE[C]. Cairo,Egypt, 2009. 1-5.
|
[11] |
YE C , REZNIK A , SHAH Y . Extracting secrecy from jointly gaussian random variables[A]. ISIT2006[C]. Seattle, 2006. 2593-2597.
|
[12] |
WANG S H , REN K . Fast and scalable secret key generation exploiting channel phase randomness in wireless networks[A]. INFOCOM,2011 Proceedings IEEE[C]. Shanghai,China, 2011. 1422-1430.
|
[13] |
MAURER U M , WOLF S . Information-theoretic key agreement:from weak to strong secrecy for free[A]. Advances in Cryptology-EUROCRYPT 2000[C]. Bruges, 2000. 351-368.
|
[14] |
GAMAL A E , KIM Y . Network Information Theory[M]. Cambridge: Cambridge University PressPress, 2011.
|
[15] |
BRASSARD G , SALVAIL L . Secret-key reconciliation by public discussion[A]. Advances in Cryptology-EUROCRYPT’93[C]. Lofthus, 1994. 765: 410-423.
|
[16] |
YE C , NARAYAN P . Secret key and private key constructions for simple multiterminal source models[J]. IEEE Trans on Information Theory, 2012,58(2): 639-651.
|