Journal of Computer Applications ›› 2026, Vol. 46 ›› Issue (3): 839-846.DOI: 10.11772/j.issn.1001-9081.2025030297
• Cyber security • Previous Articles Next Articles
Qiong LI1, Chunyi CHEN1,2(
), Zhenzhong ZHANG1, Bo YU1, Haiyang YU1, Xiaojuan HU1
Received:2025-03-24
Revised:2025-05-08
Accepted:2025-05-12
Online:2025-05-19
Published:2026-03-10
Contact:
Chunyi CHEN
About author:LI Qiong, born in 1997, Ph. D. candidate. Her research interests include wireless channel key extraction.Supported by:
李琼1, 陈纯毅1,2(
), 张振忠1, 于波1, 于海洋1, 胡小娟1
通讯作者:
陈纯毅
作者简介:李琼(1997—),女,河南周口人,博士研究生,CCF会员,主要研究方向:无线信道密钥提取基金资助:CLC Number:
Qiong LI, Chunyi CHEN, Zhenzhong ZHANG, Bo YU, Haiyang YU, Xiaojuan HU. Difference-based shared key extraction scheme via multi-level quantization[J]. Journal of Computer Applications, 2026, 46(3): 839-846.
李琼, 陈纯毅, 张振忠, 于波, 于海洋, 胡小娟. 基于差分的多级量化共享密钥提取方案[J]. 《计算机应用》唯一官方网站, 2026, 46(3): 839-846.
Add to citation manager EndNote|Ris|BibTeX
URL: https://www.joca.cn/EN/10.11772/j.issn.1001-9081.2025030297
| 变量符号 | 含义 |
|---|---|
| yX | Alice/Bob接收到的光信号序列,其中X=A代表Alice方,X=B代表Bob方 |
| Pt | 激光器发出光信号的功率 |
| hAB | Alice到Bob大气湍流引起的瞬时无线信道系数波动 |
| hBA | Bob到Alice大气湍流引起的瞬时无线信道系数波动 |
| nX | 均值为0、方差为 |
| ϕX | Alice和Bob重构后的直接观测序列 |
| N | 合法双方直接观测序列的长度 |
| DX | 直接观测序列随机抽样差分序列 |
| kX | ASQ/BMMQ算法量化得到的原始密钥序列 |
| R | PRNG生成的长度为N的随机数序列 |
| I | 序列R中所有元素有序排列前的索引位置 |
| ASQ量化算法中较大的量化门限 | |
| ASQ量化算法中较小的量化门限 | |
| θ | 可调节参数,用来调节ASQ量化保护带的宽度 |
| QX | BMMQ中的量化门限集合 |
| n | BMMQ量化门限的个数,能够将样本空间划分为n+1个区域 |
| m,s,ε | |
| EX,m | 第m个量化区域的中心点 |
| vA,i | 具有方向的单位向量 |
| δ | 可调节参数,用来调节BMMQ量化保护带的宽度 |
| KX | 原始密钥序列经信息协商后的密钥序列 |
| CX | DX 经信号重构后的序列 |
| ρ | 自相关系数 |
| γ | 信噪比 |
Tab. 1 Description of variable symbols
| 变量符号 | 含义 |
|---|---|
| yX | Alice/Bob接收到的光信号序列,其中X=A代表Alice方,X=B代表Bob方 |
| Pt | 激光器发出光信号的功率 |
| hAB | Alice到Bob大气湍流引起的瞬时无线信道系数波动 |
| hBA | Bob到Alice大气湍流引起的瞬时无线信道系数波动 |
| nX | 均值为0、方差为 |
| ϕX | Alice和Bob重构后的直接观测序列 |
| N | 合法双方直接观测序列的长度 |
| DX | 直接观测序列随机抽样差分序列 |
| kX | ASQ/BMMQ算法量化得到的原始密钥序列 |
| R | PRNG生成的长度为N的随机数序列 |
| I | 序列R中所有元素有序排列前的索引位置 |
| ASQ量化算法中较大的量化门限 | |
| ASQ量化算法中较小的量化门限 | |
| θ | 可调节参数,用来调节ASQ量化保护带的宽度 |
| QX | BMMQ中的量化门限集合 |
| n | BMMQ量化门限的个数,能够将样本空间划分为n+1个区域 |
| m,s,ε | |
| EX,m | 第m个量化区域的中心点 |
| vA,i | 具有方向的单位向量 |
| δ | 可调节参数,用来调节BMMQ量化保护带的宽度 |
| KX | 原始密钥序列经信息协商后的密钥序列 |
| CX | DX 经信号重构后的序列 |
| ρ | 自相关系数 |
| γ | 信噪比 |
| 测试项 | P-value |
|---|---|
| Frequency | 0.122 3 |
| Block Frequency | 0.350 5 |
| Cumulative Sums | 0.534 1 |
| Runs | 0.122 3 |
| Longest Run | 0.739 9 |
| Rank | 0.534 1 |
| FFT | 0.534 1 |
| Nonoverlapping Template | 0.506 6 |
| Overlapping Template | 0.122 3 |
| Approximate Entropy | 0.911 4 |
| Serial | 0.066 9 |
| Linear Complexity | 0.350 5 |
Tab. 2 NIST randomness test results
| 测试项 | P-value |
|---|---|
| Frequency | 0.122 3 |
| Block Frequency | 0.350 5 |
| Cumulative Sums | 0.534 1 |
| Runs | 0.122 3 |
| Longest Run | 0.739 9 |
| Rank | 0.534 1 |
| FFT | 0.534 1 |
| Nonoverlapping Template | 0.506 6 |
| Overlapping Template | 0.122 3 |
| Approximate Entropy | 0.911 4 |
| Serial | 0.066 9 |
| Linear Complexity | 0.350 5 |
| [1] | BLOCH M, BARROS J. Physical-layer security: from information theory to security engineering [M]. Cambridge: Cambridge University Press, 2011. |
| [2] | ZENG K. Physical layer key generation in wireless networks: challenges and opportunities [J]. IEEE Communications Magazine, 2015, 53(6): 33-39. |
| [3] | STAMP M. Information security: principles and practice [M]. 2nd ed. New York: John Wiley & Sons, 2011. |
| [4] | ZHANG J, DUONG T Q, MARSHALL A, et al. Key generation from wireless channels: a review [J]. IEEE Access, 2016, 4: 614-626. |
| [5] | 胡爱群,李古月. 无线通信物理层安全方法综述[J]. 数据采集与处理, 2014, 29(3): 341-350. |
| HU A Q, LI G Y. Physical layer security in wireless communication: survey [J]. Journal of Data Acquisition and Processing, 2014, 29(3): 341-350. | |
| [6] | SHANNON C E. Communication theory of secrecy systems [J]. The Bell System Technical Journal, 1949, 28(4): 656-715. |
| [7] | ZAPATERO V, VAN LEENT T, ARNON-FRIEDMAN R, et al. Advances in device-independent quantum key distribution [J]. npj Quantum Information, 2023, 9: No.10. |
| [8] | LI W, ZHANG L, TAN H, et al. High-rate quantum key distribution exceeding 110 Mb s–1 [J]. Nature Photonics, 2023, 17(5): 416-421. |
| [9] | CAO Y, ZHAO Y, WANG Q, et al. The evolution of quantum key distribution networks: on the road to the Qinternet [J]. IEEE Communications Surveys and Tutorials, 2022, 24(2): 839-894. |
| [10] | CHEN C, YANG H. Shared secret key generation from signal fading in a turbulent optical wireless channel using common-transverse-spatial-mode coupling [J]. Optics Express, 2018, 26(13): 16422-16441. |
| [11] | CHEN C. Sample-grouping-based vector quantization for secret key extraction from atmospheric optical wireless channels [J]. IEEE Transactions on Wireless Communications, 2022, 21(11): 8905-8918. |
| [12] | CHEN C, LI Q. Enhanced secret-key generation from atmospheric optical channels with the use of random modulation [J]. Optics Express, 2022, 30(25): 45862-45882. |
| [13] | ENDO H, FUJIWARA M, KITAMURA M, et al. Free space optical secret key agreement [J]. Optics Express, 2018, 26(18): 23305-23332. |
| [14] | ZHANG J, MARSHALL A, HANZO L. Channel-envelope differencing eliminates secret key correlation: LoRa-based key generation in low power wide area networks [J]. IEEE Transactions on Vehicular Technology, 2018, 67(12): 12462-12466. |
| [15] | 戴峤,金梁,黄开枝. 基于信道特征量化的自适应密钥生成方案设计[J]. 通信学报, 2014, 35(1): 191-197. |
| DAI Q, JIN L, HUANG K Z. Adaptive key distillation from channel characteristics [J]. Journal on Communications, 2014, 35(1): 191-197. | |
| [16] | 吴宣利,许智聪,王禹辰,等. 基于信道相关性的物理层安全性能分析[J]. 通信学报, 2021, 42(3): 65-74. |
| WU X L, XU Z C, WANG Y C, et al. Performance analysis of physical layer security based on channel correlation [J]. Journal on Communications, 2021, 42(3): 65-74. | |
| [17] | ALDAGHRI N, MAHDAVIFAR H. Physical layer secret key generation in static environments [J]. IEEE Transactions on Information Forensics and Security, 2020, 15: 2692-2705. |
| [18] | LI G, HU A, ZHANG J, et al. High-agreement uncorrelated secret key generation based on principal component analysis preprocessing [J]. IEEE Transactions on Communications, 2018, 66(7): 3022-3034. |
| [19] | ZHANG J, MARSHALL A, WOODS R, et al. Efficient key generation by exploiting randomness from channel responses of individual OFDM subcarriers [J]. IEEE Transactions on Communications, 2016, 64(6): 2578-2588. |
| [20] | PAN G, CHEN C, YAO H, et al. Shared secret key extraction from atmospheric optical wireless channels with multi-scale information reconciliation [J]. Ad Hoc Networks, 2024, 164: No.103638. |
| [21] | TRINH P V, CARRASCO-CASADO A, PHAM A T, et al. Secrecy analysis of FSO systems considering misalignments and eavesdropper’s location [J]. IEEE Transactions on Communications, 2020, 68(12): 7810-7823. |
| [22] | 傅洪亮,康超男,韩伟良,等. 被动窃听环境中基于信道状态信息的物理层安全预编码设计[J]. 计算机应用, 2023, 43(S1): 182-186. |
| FU H L, KANG C N, HAN W L, et al. Physical layer security precoding design based on channel state information in passive eavesdropping scenario [J]. Journal of Computer Applications, 2023, 43(S1): 182-186. | |
| [23] | PAN G, CHEN C. B+-tree-quantization-based shared secret key extraction scheme from atmospheric optical wireless channel [J]. IEEE Transactions on Communications, 2025, 73(5): 3394-3408. |
| [24] | SAYEED A, PERRIG A. Secure wireless communications: secret keys through multipath [C]// Proceedings of the 2008 IEEE International Conference on Acoustics, Speech and Signal Processing. Piscataway: IEEE, 2008: 3013-3016. |
| [25] | 陈纯毅,熊琴琴,于海洋,等. 双Johnson SB分布湍流扰动 OAM 光通信接收信号生成研究[J]. 通信学报, 2020, 41(11): 108-115. |
| CHEN C Y, XIONG Q Q, YU H Y, et al. Study on generation of turbulence-distorted received signals in OAM optical communications obeying dual Johnson SB distribution [J]. Journal on Communications, 2020, 41(11): 108-115. |
| [1] | Zhenyu ZHANG, Guoping TAN, Siyuan ZHOU. Efficient wireless federated learning algorithm based on 1‑bit compressive sensing [J]. Journal of Computer Applications, 2022, 42(6): 1675-1682. |
| [2] | TU Hongyan, ZHANG Ting, XIA Pengfei, DU Yi. Reconstruction method for uncertain spatial information based on improved variational auto-encoder [J]. Journal of Computer Applications, 2021, 41(10): 2959-2963. |
| [3] | WU Hailong, BAI Zhengyao, ZHANG Yu, HE Qian. Design and realization of low frequency radio astronomical signal acquisition circuit based on modulated wideband converter [J]. Journal of Computer Applications, 2018, 38(2): 610-614. |
| [4] | WANG Qiang, ZHANG Peilin, WANG Huaiguang, YANG Wangcan, CHEN Yanlong. Survey on construction of measurement matrices in compressive sensing [J]. Journal of Computer Applications, 2017, 37(1): 188-196. |
| [5] | GOU Chengfu, CHEN Bin, ZHAO Xuezhuan, CHEN Gang. Object tracking algorithm based on random sampling consensus estimation [J]. Journal of Computer Applications, 2016, 36(9): 2566-2569. |
| [6] | TIAN Zengshan, DAI Haipeng. WiFi fingerprint database updating based on surface fitting [J]. Journal of Computer Applications, 2016, 36(5): 1192-1195. |
| [7] | WANG Haipeng, WANG Zhengliang, XU Weiwei, FAN Ran. Real-time face pose estimation system based on 3D face model on Android mobile platform [J]. Journal of Computer Applications, 2015, 35(8): 2321-2326. |
| [8] | XIE Bin, CHEN Bo, LE Honghao. Improved linear minimum mean square error channel estimation algorithm based on orthogonal frequency division multiplexing [J]. Journal of Computer Applications, 2015, 35(11): 3265-3269. |
| [9] | LI Lina ZENG Qingxun GAN Xiaoye LIANG Desu. Under-determined blind source separation based on potential function and compressive sensing [J]. Journal of Computer Applications, 2014, 34(3): 658-662. |
| [10] | LI Weisheng WANG Gao. Adaptive moving object detection method based on spatial-temporal background model [J]. Journal of Computer Applications, 2014, 34(12): 3515-3520. |
| [11] | WANG Guanhao XU Jun. Joint reconstruction of breast dynamic contrast-enhanced magnetic resonance images with group sparsity method [J]. Journal of Computer Applications, 2014, 34(11): 3304-3308. |
| [12] | ZHANG Zongnian LI Jinhui HUANG Rentai YAN Jingwen. Iterative Hard Thresholding Orthogonal Projection under Cosparsity Analysis Model [J]. Journal of Computer Applications, 2013, 33(08): 2387-2389. |
| [13] | WANG Lijuan HAO Zhifeng CAI Ruichu WEN Wen. Selective K-means clustering ensemble based on random sampling [J]. Journal of Computer Applications, 2013, 33(07): 1969-1972. |
| [14] | ZHANG Xukun MA Shexiang. Rate-distortion analysis for quantizing compressive sensing [J]. Journal of Computer Applications, 2013, 33(01): 295-298. |
| [15] | YANG Guan-ci LI Shao-bo ZHONG Yong. Probability analysis of capturing specific objects in stratified sampling model [J]. Journal of Computer Applications, 2012, 32(08): 2209-2211. |
| Viewed | ||||||
|
Full text |
|
|||||
|
Abstract |
|
|||||