Secret Information Transmission and Sharing Techniques Based on Radio Wave Propagation Characteristics

نویسندگان

  • Hisato IWAI
  • Hideichi SASAOKA
چکیده

あらまし 電波伝搬特性を活用して秘密情報を送受信間で他者に知られることなく伝送・共有する技術につい て,特に電波伝搬の観点から述べる.まず最初に,将来のユビキタスネットワークにおける本技術の位置付けに ついて示す.次に,秘密情報の伝送・共有に電波伝搬特性を活用する方式の基本原理を示す.また,情報理論の 情報量の概念を用いてこの手法の特性を明らかにする.そして,これまで既に研究が行われている電波伝搬特性 に基づいて通信を暗号化するための暗号鍵を生成する方法について紹介する.その実現例の原理を示し,具体的 な秘密情報伝送・共有の特性について明らかにする.このような電波伝搬特性を活用した秘密情報伝送・共有技 術に対しては,他者からの情報盗聴の試み(アタック)に対する耐性が重要となる.このようなアタックについ て電波伝搬的な手法の一例を示し,その実現可能性及び推定性能について示す.最後に,電波伝搬特性を活用し たその他の秘密情報の伝送・共有技術について簡単に触れる. キーワード 電波伝搬,空間相関,セキュリティ,秘密鍵共有

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

کاربرد روش معادله سهموی در تحلیل مسائل انتشار امواج داخل ساختمان

With the rapid growth of indoor wireless communication systems, the need to accurately model radio wave propagation inside the building environments has increased. Many site-specific methods have been proposed for modeling indoor radio channels. Among these methods, the ray tracing algorithm and the finite-difference time domain (FDTD) method are the most popular ones. The ray tracing approach ...

متن کامل

On the design and security of a lattice-based threshold secret sharing scheme

In this paper, we introduce a method of threshold secret sharing scheme (TSSS) in which secret reconstruction is based on Babai's nearest plane algorithm. In order to supply secure public channels for transmitting shares to parties, we need to ensure that there are no quantum threats to these channels. A solution to this problem can be utilization of lattice-based cryptosystems for these channe...

متن کامل

Secret Sharing Based On Cartesian product Of Graphs

The purpose of this paper is to study the information ratio of perfect secret sharing of product of some special families of graphs. We seek to prove that the information ratio of prism graphs $Y_{n}$ are equal to $frac{7}{4}$ for any $ngeq 5$, and we will gave a partial answer to a question of Csirmaz cite{CL}. We will also study the information ratio of two other families $C_{m}times C_{n}$ a...

متن کامل

Computationally secure multiple secret sharing: models, schemes, and formal security analysis

A multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants. in such a way a multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants, such that any authorized subset of participants can reconstruct the secrets. Up to now, existing MSSs either require too long shares for participants to be perfect secur...

متن کامل

An Efficient Threshold Verifiable Multi-Secret Sharing Scheme Using Generalized Jacobian of Elliptic Curves

‎In a (t,n)-threshold secret sharing scheme‎, ‎a secret s is distributed among n participants such that any group of t or more participants can reconstruct the secret together‎, ‎but no group of fewer than t participants can do‎. In this paper, we propose a verifiable (t,n)-threshold multi-secret sharing scheme based on Shao and Cao‎, ‎and the intractability of the elliptic curve discrete logar...

متن کامل

An Efficient Secret Sharing-based Storage System for Cloud-based Internet of Things

Internet of things (IoTs) is the newfound information architecture based on the internet that develops interactions between objects and services in a secure and reliable environment. As the availability of many smart devices rises, secure and scalable mass storage systems for aggregate data is required in IoTs applications. In this paper, we propose a new method for storing aggregate data in Io...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007