SECRET KEY SHARING SYSTEM AND SECRET KEY SHARING METHOD
20230022825 · 2023-01-26
Assignee
Inventors
Cpc classification
H04L9/085
ELECTRICITY
H04L9/0656
ELECTRICITY
H04L2209/34
ELECTRICITY
International classification
Abstract
A secret key sharing system includes a transceiver in a first layer, a plurality of transceivers in a second layer, and a plurality of transceivers in a third layer. The transceivers in the second layer receive a first random number from the transceiver in the first layer via a directional carrier wave. The transceivers in the third layer receive a second random number from one of the transceivers in the second layer via the carrier wave. The transceiver in the first layer and the transceivers in the second layer share a first secret key based on the first random number, and the one of the transceivers in the second layer and the plurality of transceivers in the third layer share a second secret key based on the second random number.
Claims
1. A secret key sharing system comprising: a transceiver in a first layer; a plurality of transceivers in a second layer that receive a first random number from the transceiver in the first layer via a directional carrier wave; and a plurality of transceivers in a third layer that receive a second random number from one transceiver of the plurality of transceivers in the second layer via the carrier wave, wherein the transceiver in the first layer and the plurality of transceivers in the second layer share a first secret key based on the first random number, and the one transceiver of the plurality of transceivers in the second layer and the plurality of transceivers in the third layer share a second secret key based on the second random number, the plurality of transceivers in the third layer receive a calculated value by an exclusive OR of the first secret key and the second secret key from the one transceiver of the plurality of transceivers in the second layer via a public communication path as a communication path open to public, and calculate the first secret key by obtaining an exclusive OR of the received calculated value and the second secret key, and the first secret key and the second secret key are generated by respectively referring to a first bit error rate and a second bit error rate of the first random number and the second random number carried via the carrier wave, a first leaked information amount and a second leaked information amount, first correction information and second correction information, and a first compression ratio and a second compression ratio, the first bit error rate and the second bit error rate are transmitted and received via the public communication path, the first leaked information amount and the second leaked information amount are amounts of the first random number and the second random number leaked from the carrier wave, the first correction information and the second correction information are for correcting errors of the first random number and the second random number carried via the carrier wave, and the first compression ratio and the second compression ratio are ratios for compressing the first random number and the second random number.
2. The secret key sharing system according to claim 1, wherein the transceiver in the first layer and the plurality of transceivers in the second layer each include a monitoring unit that monitors in a predetermined range, and the first leaked information amount is calculated by an out-of-range transceiver provided outside the range monitored by each of the monitoring units.
3. The secret key sharing system according to claim 1, wherein the first correction information is transmitted from the transceiver in the first layer to the plurality of transceivers in the second layer, and the second correction information is transmitted from the one transceiver of the plurality of transceivers in the second layer to the plurality of transceivers in the third layer.
4. The secret key sharing system according to claim 1, wherein the first correction information is transmitted from a predetermined one transceiver of the plurality of transceivers in the second layer to others of the plurality of transceivers in the second layer and the transceiver in the first layer, and the second correction information is transmitted from a predetermined one transceiver of the plurality of transceivers in the third layer to others of the plurality of transceivers in the third layer and the one transceiver of the plurality of transceivers in the second layer.
5. A secret key sharing method comprising: a key distillation step including: a parameter estimation step of calculating a first bit error rate and a second bit error rate and a first leaked information amount and a second leaked information amount, the first bit error rate and the second bit error rate being bit error rates of a first random number in a first layer and a second random number in a second layer carried via a directional carrier wave, the first leaked information amount and the second leaked information amount being amounts of the first random number and the second random number leaked from the carrier wave; an information reconciliation step of generating first correction information and second correction information for correcting errors of the first random number and the second random number carried via the carrier wave and correcting the first random number and the second random number carried via the carrier wave by the first correction information and the second correction information; and a privacy amplification step of compressing the first random number and the second random number carried via the carrier wave, the key distillation step generating a first secret key and a second secret key from the first random number and the second random number carried via the carrier wave; and a key encapsulation relay step of receiving a calculated value by an exclusive OR of the first secret key and the second secret key via a public communication path as a communication path open to public, and calculating the first secret key by obtaining an exclusive OR of the received calculated value and the second secret key in the second layer.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0011]
[0012]
[0013]
[0014]
[0015]
[0016]
[0017]
DESCRIPTION OF PREFERRED EMBODIMENTS
[0018] The following describes one aspect of an embodiment of the present invention in detail.
[0019]
[0020] The secret key sharing system 1 includes a plurality of transceivers 14, 15, 16 in the third layer that receive a third random number R.sub.0″ from the transceiver 5 as one of the plurality of transceivers 4, 5, 6 in the second layer via a carrier wave.
[0021] The secret key sharing system 1 includes a plurality of transceivers 19, 20, 21 in the third layer that receive a fourth random number R.sub.0′″ from the transceiver 6 as one of the plurality of transceivers 4, 5, 6 in the second layer via a carrier wave. The first random number R.sub.0, the second random number R.sub.0′, the third random number R.sub.0″, and the fourth random number R.sub.0′″ each include a bit string including a plurality of bits.
[0022] The transceivers 4, 5, 6 constitute a group 3. For example, the group 3 includes the transceivers 4, 5, 6 in a physically separated section. The separated section is, for example, in a predetermined range monitored by a monitoring unit 36 described below included in each of the transceivers 4, 5, 6.
[0023] Similarly, the transceivers 9, 10, 11 constitute a group 8. For example, the group 8 includes the transceivers 9, 10, 11 in a separated section. The separated section is, for example, in a predetermined range monitored by a monitoring unit 36 included in each of the transceivers 9, 10, 11.
[0024] Similarly, the transceivers 14, 15, 16 constitute a group 13. For example, the group 13 includes the transceivers 14, 15, 16 in a separated section. The separated section is, for example, in a predetermined range monitored by a monitoring unit 36 included in each of the transceivers 14, 15, 16.
[0025] Similarly, the transceivers 19, 20, 21 constitute a group 18. For example, the group 18 includes the transceivers 19, 20, 21 in a separated section. The separated section is, for example, in a predetermined range monitored by a monitoring unit 36 included in each of the transceivers 19, 20, 21.
[0026] A transceiver 7 (hereinafter, this may be referred to as an out-of-range transceiver) is provided, for example, outside the separated section in which the group 3 is formed so as to be adjacent to the section. A first leaked information amount I.sub.leak described below is calculated by the transceiver 7. Similarly, transceivers 12, 17, 22 are respectively provided, for example, outside the separated sections in which the groups 8, 13, 18 are formed so as to be adjacent to the sections.
[0027] A connection between the first layer and the second layer is referred to as an upper layer link, and a connection between the second layer and the third layer is referred to as a lower layer link. The connection between the first layer and the second layer specifically means a connection between the transceiver 2 and the transceivers 4 to 6. The connection between the second layer and the third layer specifically means, for example, a connection between the transceiver 4 and the transceivers 9 to 11.
[0028] The transceiver 2 may be referred to as Alice with a meaning of transmitting side. The transceivers 4, 5, 6 may be referred to as Bob with a meaning of receiving side. The transceivers 9 to 11, 14 to 16, and 19 to 21 may be referred to as Charlie with a meaning of third party. The transceivers 7, 12, 17, 22 may be virtually referred to as virtual Eve with a meaning of device performing a passive attack such as eavesdropping. It can be said that the transceivers 7, 12, 17, 22 establish a probe communication path by the virtual attack.
[0029] Here, with reference to
[0030] The transceiver 30 includes a random number generation unit 31, a modulation unit 32, a demodulation unit 33, a directional carrier wave communication unit 34, a public communication unit 35, a monitoring unit 36, and an information processing unit 37.
[0031] The random number generation unit 31 and the information processing unit 37 are implemented as an integrated circuit or the like. The modulation unit 32, the demodulation unit 33, and the directional carrier wave communication unit 34 are devices carrying a carrier wave of light or millimeter wave formed in a beam shape, and for example, a Free Space Optics (FSO) device or a Visible Light Communication (VLC) device.
[0032] The public communication unit 35 is, for example, a Very High Frequency (VHF) communication device or an Ultra High Frequency (UHF) communication device. The monitoring unit 36 is a monitoring camera or the like.
[0033] The random number generation unit 31 generates a random number, for example, when the transceiver 30 is the transmitting side of the carrier wave like the transceiver 2. The modulation unit 32 modulates the random number generated by the random number generation unit 31, for example, when the transceiver 30 is the transmitting side of the carrier wave like the transceiver 2. The demodulation unit 33 demodulates the modulated random number, for example, when the transceiver 30 is the receiving side of the carrier wave like the transceiver 4.
[0034] The directional carrier wave communication unit 34 transmits and receives the modulated random number. The public communication unit 35 performs a communication using a public communication path. The monitoring unit 36 monitors a predetermined range, such as a viewable range, based on the transceiver 30.
[0035] The information processing unit 37 processes information. Specifically, the information processing unit 37 performs a key distillation process including a parameter estimation process, an information reconciliation process, and a privacy amplification process, and a key encapsulation relay process, which are described below.
[0036] The explanation is continued by referring again to
[0037] The transceiver 5 as one of the plurality of transceivers 4, 5, 6 in the second layer and the plurality of transceivers 14, 15, 16 in the third layer share a third secret key K.sub.2 based on the third random number R.sub.0″. The transceiver 6 as one of the plurality of transceivers 4, 5, 6 in the second layer and the plurality of transceivers 19, 20, 21 in the third layer share a fourth secret key K.sub.3 based on the fourth random number R.sub.0′″.
[0038] The plurality of transceivers 9, 10, 11 in the third layer receive a calculated value by an exclusive OR of the first secret key K.sub.0 and the second secret key K.sub.1 from the transceiver 4 as one of the plurality of transceivers 4, 5, 6 in the second layer via the public communication path as a communication path open to public. The plurality of transceivers 9, 10, 11 in the third layer obtain an exclusive OR of the received calculated value and the second secret key K.sub.1, thereby calculating the first secret key K.sub.0.
[0039] The plurality of transceivers 14, 15, 16 in the third layer receive a calculated value by an exclusive OR of the first secret key K.sub.0 and the third secret key K.sub.2 from the transceiver 5 as one of the plurality of transceivers 4, 5, 6 in the second layer via the public communication path as a communication path open to public. The plurality of transceivers 14, 15, 16 in the third layer obtain an exclusive OR of the received calculated value and the third secret key K.sub.2, thereby calculating the first secret key K.sub.0.
[0040] The plurality of transceivers 19, 20, 21 in the third layer receive a calculated value by an exclusive OR of the first secret key K.sub.0 and the fourth secret key K.sub.3 from the transceiver 6 as one of the plurality of transceivers 4, 5, 6 in the second layer via the public communication path as a communication path open to public. The plurality of transceivers 19, 20, 21 in the third layer obtain an exclusive OR of the received calculated value and the third secret key K.sub.2, thereby calculating the first secret key K.sub.0.
[0041] The first secret key K.sub.0 is generated by referring to first bit error rates BER.sub.1, BER.sub.2, BER.sub.3, a first leaked information amount I.sub.leak, first correction information ECC, and a first compression ratio CR. The second secret key K.sub.1 is generated by referring to second bit error rates BER.sub.1′, BER.sub.2′, BER.sub.3′, a second leaked information amount Leak, second correction information ECC′, and a second compression ratio CR′.
[0042] The first bit error rates BER.sub.1, BER.sub.2, BER.sub.3 are values of estimating an error rate of bits of the first random number R.sub.0 carried via the carrier wave, and transmitted and received via the public communication path. The second bit error rates BER.sub.1′, BER.sub.2′, BER.sub.3′ are error rates of bits of the second random number R.sub.0′ carried via the carrier wave, and transmitted and received via the public communication path.
[0043] The first bit error rates BER.sub.1, BER.sub.2, BER.sub.3 and the second bit error rates BER.sub.1′, BER.sub.2′, BER.sub.3′ are the rates of error bits in all of the bits, and have values in a range from 0 to 0.5.
[0044] The first leaked information amount I.sub.leak is a value of estimating an amount of the first random number R.sub.0 leaked from the carrier wave, and transmitted and received via the public communication path. The second leaked information amount I.sub.leak is an amount of the second random number R.sub.0′ leaked from the carrier wave, and transmitted and received via the public communication path. The leaked information amount, such as the first leaked information amount I.sub.leak and the second leaked information amount I.sub.leak′, indicates the amount of information, and indicates, for example, the number of bits.
[0045] The first correction information ECC is information for correcting the error of the first random number R.sub.0 carried via the carrier wave, and transmitted and received via the public communication path. The second correction information ECC′ is information for correcting the error of the second random number R.sub.0′ carried via the carrier wave, and transmitted and received via the public communication path.
[0046] The first compression ratio CR is a ratio for compressing the first random number R.sub.0, and transmitted and received via the public communication path. The second compression ratio CR′ is a ratio for compressing the second random number R.sub.0′, and transmitted and received via the public communication path. The first compression ratio CR and the second compression ratio CR′ are the ratios of the bit numbers of the first secret key K.sub.0 and the second secret key K.sub.1 to the bit numbers of the first random number R.sub.0 and the second random number R.sub.0′, and have values in a range from 0 to 1.
[0047] Since the third secret key K.sub.2, the third random number R.sub.0″, the third bit error rates BER.sub.1″, BER.sub.2″, BER.sub.3″, the third leaked information amount I.sub.leak″, the third correction information ECC″, and the third compression ratio CR′ are similar to the first secret key K.sub.0, the first random number R.sub.0, the first bit error rates BER.sub.1, BER.sub.2, BER.sub.3, the first leaked information amount I.sub.leak, the first correction information ECC, and the first compression ratio CR, the explanations are omitted.
[0048] Since the fourth secret key K.sub.3, the fourth random number R.sub.0′″, the fourth bit error rates BER.sub.1′″, BER.sub.2′″, BER.sub.3′″, the fourth leaked information amount I.sub.leak′, the fourth correction information ECC′″, and the fourth compression ratio CR′″ are similar to the first secret key K.sub.0, the first random number R.sub.0, the first bit error rates BER.sub.1, BER.sub.2, BER.sub.3, the first leaked information amount I.sub.leak, the first correction information ECC, and the first compression ratio CR, the explanations are omitted.
[0049] Next, with reference to
[0050] The transceiver 2 transmits the first random number R.sub.0 as a base of the first secret key K.sub.0 to the transceivers 4 to 7 via the carrier wave (S1 to S4). The transceivers 4 to 7 receive the first random number R.sub.0 carried via the carrier wave as the carried random numbers R.sub.1 to R.sub.4.
[0051] The transceiver 2 transmits a test bit T.sub.bit and a test bit address T.sub.addr to the transceivers 4 to 7 via the public communication path (S5 to S8). The test bit T.sub.bit includes a plurality of bits randomly extracted from the first random number R.sub.0. The test bit address T.sub.addr includes addresses in the first random number R.sub.0 of the respective plurality of bits randomly extracted from the first random number R.sub.0.
[0052] The transceivers 4 to 6 calculate the first bit error rates BER.sub.1, BER.sub.2, BER.sub.3 using the carried random numbers R.sub.1 to R.sub.3, the test bit T.sub.bit, and the test bit address T.sub.addr The transceivers 4 to 6 transmit the calculated first bit error rates BER.sub.1, BER.sub.2, BER.sub.3 to the transceiver 2 (S9 to S11).
[0053] The transceiver 7 calculates the first leaked information amount I.sub.leak using the carried random number R.sub.4, the test bit T.sub.bit, and the test bit address T.sub.addr. The transceiver 7 transmits the calculated first leaked information amount I.sub.leak to the transceiver 2 (S12).
[0054] Thus, the secret key sharing system 1 achieves the parameter estimation function as a function of estimating the parameters, such as the first bit error rates BER.sub.1, BER.sub.2, BER.sub.3 and the first leaked information amount I.sub.leak, by, for example, Steps S1 to S12.
[0055] The transceiver 2 generates the first correction information ECC based on the first bit error rates BER.sub.1, BER.sub.2, BER.sub.3 received from the transceivers 4 to 7. The higher the bit error rate is, the more the information amount of the first correction information ECC increases. For example, the transceiver 2 generates the first correction information ECC using a linear error correcting code or the like. The linear error correcting code means, for example, a low density parity check (LDPC) code.
[0056] The transceiver 2 transmits the generated first correction information ECC to the transceivers 4 to 6 (S13 to S15). The transceivers 4 to 6 correct the carried random numbers R.sub.1 to R.sub.3 so as to approach the first random number R.sub.0 using the received first correction information ECC, and generate corrected random numbers R.sub.1c to R.sub.3c.
[0057] Thus, the secret key sharing system 1 achieves the information reconciliation function as a function of reconciling the information by, for example, Steps S13 to S15. Specifically, the secret key sharing system 1 reconciles the information by correcting the carried random numbers R.sub.1 to R.sub.3 so as to approach the first random number R.sub.0.
[0058] The transceiver 2 calculates the first compression ratio CR from the first leaked information amount I.sub.leak and the first correction information ECC. The transceiver 2 transmits the calculated first compression ratio CR to the transceivers 4 to 6 (S16 to S18). The transceiver 2 compresses the first random number R.sub.0 by the calculated first compression ratio CR using a hash function, thereby generating the first secret key K.sub.0. The transceivers 4 to 6 compress the corrected random numbers R.sub.1c to R.sub.3c by the received first compression ratio CR using a hash function, thereby generating the first secret key K.sub.0.
[0059] Thus, the secret key sharing system 1 achieves the privacy amplification function as a function of amplifying the privacy by, for example, Steps S16 to S18. Specifically, the secret key sharing system 1 amplifies the privacy by deleting the information amount to be possibly leaked by the compression using the hash function.
[0060] While
[0061] Next, with reference to
[0062] As illustrated in the first phase in
[0063] The transceiver 5 is connected to the transceivers 14 to 16 of the group 13 positioned at a position apart from the position at which the first secret key K.sub.0 is generated by moving while holding the first secret key K.sub.0, and this allows the generation of the third secret key K.sub.2.
[0064] The transceiver 6 is connected to the transceivers 19 to 21 of the group 18 positioned at a position apart from the position at which the first secret key K.sub.0 is generated by moving while holding the first secret key K.sub.0, and this allows the generation of the fourth secret key K.sub.3.
[0065] Thus, performing the key distillation process multiple times allows establishing the connection between the transceivers 2, 4, 5, 6 with a tree structure as illustrated in the first phase in
[0066] In the tree structure, specifically, the transceiver 2 as a parent node in the first layer is connected to the transceivers 4 to 6 as child nodes in the second layer by sharing the first secret key K.sub.0. The transceiver 4 as a child node in the second layer is connected to the transceivers 9 to 11 as grandchild nodes in the third layer by sharing the second secret key K.sub.1.
[0067] The transceiver 5 as a child node in the second layer is connected to the transceivers 14 to 16 as grandchild nodes in the third layer by sharing the third secret key K.sub.2. The transceiver 6 as a child node in the second layer is connected to the transceivers 19 to 21 as grandchild nodes in the third layer by sharing the fourth secret key K.sub.3.
[0068] When the tree structure is built, the first secret key K.sub.0 held by the transceiver 2 is encapsulated by the operation of the exclusive OR as illustrated in the second phase in
[0069] Specifically, from the transceiver 4 to the transceivers 9 to 11, the first secret key K.sub.0 encapsulated by the second secret key K.sub.1 is transmitted. In other words, from the transceiver 4 to the transceivers 9 to 11, a calculated value K.sub.0XORK.sub.1 of the exclusive OR of the first secret key K.sub.0 and the second secret key K.sub.1 is transmitted. The transceiver 4 deletes the second secret key K.sub.1 after transmitting the calculated value K.sub.0XORK.sub.1.
[0070] Similarly, from the transceiver 5 to the transceivers 14 to 16, the first secret key K.sub.0 encapsulated by the third secret key K.sub.2 is transmitted. In other words, from the transceiver 5 to the transceivers 14 to 16, a calculated value K.sub.0XORK.sub.2 of the exclusive OR of the first secret key K.sub.0 and the third secret key K.sub.2 is transmitted. The transceiver 5 deletes the third secret key K.sub.2 after transmitting the calculated value K.sub.0XORK.sub.2.
[0071] Similarly, from the transceiver 6 to the transceivers 19 to 21, the first secret key K.sub.0 encapsulated by the fourth secret key K.sub.3 is transmitted. In other words, from the transceiver 6 to the transceivers 14 to 16, a calculated value K.sub.0XORK.sub.3 of the exclusive OR of the first secret key K.sub.0 and the fourth secret key K.sub.3 is transmitted. The transceiver 6 deletes the fourth secret key K.sub.3 after transmitting the calculated value K.sub.0XORK.sub.3.
[0072] When receiving the calculated value K.sub.0XORK.sub.1, the transceivers 9 to 11 calculate the first secret key K.sub.0 as the exclusive OR of the second secret key K.sub.1 and the calculated value K.sub.0XORK.sub.1. Similarly, when receiving the calculated value K.sub.0XORK.sub.2, the transceivers 14 to 16 calculate the first secret key K.sub.0 as the exclusive OR of the third secret key K.sub.2 and the calculated value K.sub.0XORK.sub.2. Similarly, when receiving the calculated value K.sub.0XORK.sub.3, the transceivers 19 to 21 calculate the first secret key K.sub.0 as the exclusive OR of the fourth secret key K.sub.3 and the calculated value K.sub.0XORK.sub.3.
[0073] As described above, the transceivers 2, 4 to 6, 9 to 11, 14 to 16, and 19 to 21 can share the first secret key K.sub.0. Thus, since the first secret key K.sub.0 is shared through the key distillation process performed multiple times in the embodiment, erroneous information and information to be possibly leaked are not accumulated. When the key distillation process is performed only once as a conventional one, since the same random number is transmitted across the layers, erroneous information and information to be possibly leaked are accumulated for each layer of the first layer, the second layer, and the like.
[0074] Next, with reference to
[0075] The modulation unit 32 of the transceiver 2 modulates the first random number R.sub.0 generated by the random number generation unit 31 of the transceiver 2. The directional carrier wave communication unit 34 of the transceiver 2 transmits the first random number R.sub.0 modulated by the modulation unit 32 of the transceiver 2 to the directional carrier wave communication unit 34 of the transceiver 4 and the directional carrier wave communication unit 34 of the transceiver 7 (S22).
[0076] The information processing unit 37 of the transceiver 2 randomly extracts a plurality of bits from the first random number R.sub.0, and generates the test bit T.sub.bit (S23). The public communication unit 35 of the transceiver 2 transmits the test bit T.sub.bit and the test bit address T.sub.addr to the public communication unit 35 of the transceiver 4 and the public communication unit 35 of the transceiver 7 (S24).
[0077] The processes in the transceiver 7 will be described. The transceiver 7 relates to the parameter estimation process. First, the directional carrier wave communication unit 34 of the transceiver 7 receives the first random number R.sub.0 modulated by the modulation unit 32 of the transceiver 2 from the directional carrier wave communication unit 34 of the transceiver 2 (S41). The demodulation unit 33 of the transceiver 7 demodulates the modulated first random number R.sub.0 received by the directional carrier wave communication unit 34 of the transceiver 7.
[0078] The public communication unit 35 of the transceiver 7 receives the test bit T.sub.bit and the test bit address T.sub.addr (S42). The information processing unit 37 of the transceiver 7 obtains a conditional probability from the first random number R.sub.0 demodulated by the demodulation unit 33 of the transceiver 7 and the test bit T.sub.bit and the test bit address T.sub.addr received by the public communication unit 35 of the transceiver 7, thereby estimating communication path characteristics of the communication via the carrier wave.
[0079] The information processing unit 37 of the transceiver 7 compares the estimated communication path characteristics with the communication path characteristics estimated in the past, thereby evaluating the communication path characteristics of the communication via the carrier wave (S43). The information processing unit 37 of the transceiver 7 calculates the first leaked information amount I.sub.leak based on the evaluation of the communication path characteristics. The public communication unit 35 of the transceiver 7 transmits the calculated first leaked information amount I.sub.leak to the public communication unit 35 of the transceiver 2 (S44). When the processes from Steps S41 to S44 end, the transceiver 7 ends the process.
[0080] The parameter estimation process in the transceiver 4 will be described. First, the directional carrier wave communication unit 34 of the transceiver 4 receives the first random number R.sub.0 modulated by the modulation unit 32 of the transceiver 2 from the directional carrier wave communication unit 34 of the transceiver 2 (S51). The demodulation unit 33 of the transceiver 4 demodulates the modulated first random number R.sub.0 received by the directional carrier wave communication unit 34 of the transceiver 4.
[0081] The public communication unit 35 of the transceiver 4 receives the test bit T.sub.bit and the test bit address T.sub.addr (S52). The information processing unit 37 of the transceiver 4 calculates the first bit error rate BER.sub.1 from the first random number R.sub.0 demodulated by the demodulation unit 33 of the transceiver 4 and the test bit T.sub.bit and the test bit address T.sub.addr received by the public communication unit 35 of the transceiver 4. The public communication unit 35 of the transceiver 4 transmits the calculated first bit error rate BER.sub.1 to the public communication unit 35 of the transceiver 2 (S53). When the processes from Steps S51 to S53 end, the transceiver 4 ends the parameter estimation process.
[0082] Similarly to the transceiver 4, the information processing units 37 of the transceivers 5, 6 calculate the first bit error rates BER.sub.2, BER.sub.3 from the test bit T.sub.bit and the test bit address T.sub.addr The public communication units 35 of the transceivers 5, 6 transmit the first bit error rates BER.sub.2, BER.sub.3 to the public communication unit 35 of the transceiver 2.
[0083] The description will be continued for the transceiver 2 again. The public communication unit 35 of the transceiver 2 receives the first bit error rates BER.sub.1, BER.sub.2, BER.sub.3 from the public communication units 35 of the transceivers 4, 5, 6 (S25).
[0084] The public communication unit 35 of the transceiver 2 receives the first leaked information amount I.sub.leak from the public communication unit 35 of the transceiver 7 (S26). The transceiver 2 ends the parameter estimation process when Steps S21 to S26 end, and starts the information reconciliation process.
[0085] As the information reconciliation process in the transceiver 2, the information processing unit 37 of the transceiver 2 generates the first correction information ECC, for example, corresponding to the highest bit error rate among the first bit error rates BER.sub.1, BER.sub.2, BER.sub.3 received from the transceivers 4 to 7 (S27). The public communication unit 35 of the transceiver 2 transmits the generated first correction information ECC to the public communication units 35 of the transceivers 4, 5, 6 (S28). The transceiver 2 ends the information reconciliation process when Steps S27, S28 end, and starts the privacy amplification process.
[0086] The information reconciliation process in the transceiver 4 will be described. The public communication unit 35 of the transceiver 4 receives the first correction information ECC (S54). The information processing unit 37 of the transceiver 4 corrects the carried random number R.sub.1 so as to approach the first random number R.sub.0 using the received first correction information ECC, and generates the corrected random number R.sub.1c (S55). The transceiver 4 ends the information reconciliation process when Steps S54, S55 end, and starts the privacy amplification process.
[0087] Similarly to the transceiver 4, the information processing units 37 of the transceivers 5, 6 correct the carried random numbers R.sub.2, R.sub.3 so as to approach the first random number R.sub.0 using the received first correction information ECC, and generate the corrected random numbers R.sub.2c, R.sub.3c.
[0088] The privacy amplification process in the transceiver 2 will be described. The information processing unit 37 of the transceiver 2 calculates the first compression ratio CR from the first leaked information amount I.sub.leak received by the public communication unit 35 of the transceiver 2 and the generated first correction information ECC (S29).
[0089] The public communication unit 35 of the transceiver 2 transmits the calculated first compression ratio CR to the public communication units 35 of the transceivers 4, 5, 6 (S30).
[0090] The information processing unit 37 of the transceiver 2 compresses the first random number R.sub.0 by the calculated first compression ratio CR using the hash function, thereby generating the first secret key K.sub.0 (S31). The transceiver 2 ends the privacy amplification process when Steps S29 to S31 end, and ends the key distillation process.
[0091] The privacy amplification process in the transceiver 4 will be described. The public communication unit 35 of the transceiver 4 receives the calculated first compression ratio CR (S56). The information processing unit 37 of the transceiver 4 compresses the corrected random number R.sub.1c by the received first compression ratio CR using the hash function, thereby generating the first secret key K.sub.0 (S57). The transceiver 4 ends the privacy amplification process when Steps S56, S57 end, and ends the key distillation process.
[0092] Similarly to the transceiver 4, the information processing units 37 of the transceivers 5, 6 compress the corrected random numbers R.sub.2c, R.sub.3c by the received first compression ratio CR using the hash function, thereby generating the first secret key K.sub.0.
[0093] Next, with reference to
[0094] The public communication units 35 of the transceivers 4, 5, 6 transmit the calculated values K.sub.0XORK.sub.1, K.sub.0XORK.sub.2, K.sub.0XORK.sub.3 of the exclusive OR in the second layer from the second layer to the third layer (S62). For example, the public communication units 35 of the transceivers 9, 14, 19 calculate the first secret key K.sub.0 as the exclusive OR in the third layer from the calculated value K.sub.0XORK.sub.1, K.sub.0XORK.sub.2, or K.sub.0XORK.sub.3 of the exclusive OR in the second layer and the second secret key K.sub.1, the third secret key K.sub.2, or the fourth secret key K.sub.3 of the lower layer link (S63). The information processing units 37 of the transceivers 4, 5, 6, 9 delete the second secret key K.sub.1, the third secret key K.sub.2, and the fourth secret key K.sub.3 used by the lower layer link in the second layer (S64).
[0095] As described above, since the secret key sharing system 1 according to the embodiment performs the key distillation process in each layer of the upper layer link, the lower layer link, and the like, the second compression ratio CR and the like in the lower layer do not become small compared with the first compression ratio CR in the upper layer. Therefore, the load is approximately uniformly applied to each node of the transceivers 2, 4 to 6, 9 to 11, 14 to 16, 19 to 21, and the like, and it can be said that the secret key sharing system 1 according to the embodiment has the efficiency.
[0096] The reason for the efficiency provided to the secret key sharing system 1 according to the embodiment also includes that the calculation amount is small because the key encapsulation relay process is performed with the one-time pad cipher using the exclusive OR.
[0097] Since the carrier wave having the directionality and flared to some extent is used, for example, the reason for the efficiency provided to the secret key sharing system 1 according to the embodiment also includes that the transceiver 2 can communicate with a plurality of transceivers, such as the transceivers 9 to 11.
[0098] In the secret key sharing system 1 according to the embodiment, the first random number R.sub.0 as the base of the first secret key K.sub.0 shared among the nodes is carried by the directional carrier wave, and the key distillation process is performed. In view of this, it can be said that the information-theoretic security is provided.
[0099] The secret key sharing system 1 according to the embodiment only encapsulates the first secret key K.sub.0 using the operation by the exclusive OR in each of the layers such as the upper layer link and the lower layer link.
[0100] Therefore, the control procedure is simple, and it can be said that the scalability is provided. It is easy to newly add a transceiver 40 and transceivers 42 to 44 forming a group 41 after the first secret key K.sub.0 is shared by the transceivers 2, 4 to 6, 9 to 11, 14 to 16, and 19 to 21 like the second phase illustrated in
[0101] A description will be given by referring to
[0102] Similarly to the transceiver 40, the transceivers 42 to 44 forming the group 41 in a fourth layer share a sixth secret key K.sub.5 with the transceiver 9, and then, share the first secret key K.sub.0 with each node of the secret key sharing system 1 using the operation by the exclusive OR. Thus, the secret key sharing system 1 according to the embodiment has the scalability, and also has an ad-hoc property of facilitating the addition of the transceiver 40 and the group 41.
[0103] While the example in which the nodes constituting the secret key sharing system 1 are each a transceiver is described in the embodiment, the embodiment is not limited thereto. For example, the transceiver 2 may be a large aircraft flying in the stratosphere, the transceivers 4 to 6 may be flying objects such as drones flying in a zone near the ground, and the transceivers 9 to 11, 14 to 16, 19 to 21 may be ground stations installed on the ground.
[0104] While the case where the random number generation unit 31 and the information processing unit 37 are implemented as an integrated circuit or the like is described in the embodiment, the embodiment is not limited thereto. For example, each of the random number generation unit 31, the modulation unit 32, the demodulation unit 33, and the information processing unit 37 may be a program stored in a storage device, such as a Solid State Drive (SSD), a Hard Disk Drive (HDD), and a Random Access Memory (RAM). In this case, the process of each unit is performed by reading the program by a Central Processing Unit (CPU).
[0105] While the case where the transceiver 2 as the transmitting side generates the first correction information ECC is described in the embodiment, the embodiment is not limited thereto. For example, the first correction information ECC may be generated by a predetermined one transceiver of the plurality of transceivers in the second layer.
[0106] For example, assume that the predetermined one transceiver of the plurality of transceivers in the second layer is the transceiver 4. In this case, the first correction information ECC is transmitted from the transceiver 4 to the transceivers 5, 6 as others of the plurality of transceivers in the second layer and the transceiver 2 in the first layer.
[0107] The same applies to the second correction information ECC′ as the first correction information ECC. The second correction information ECC′ is transmitted from a predetermined one transceiver, such as the transceiver 9, of the plurality of transceivers in the third layer to the transceivers 10, 11 as others of the plurality of transceivers in the third layer and the transceiver 4 as the one of the plurality of transceivers in the second.
[0108] While the communication between the transceivers 4 to 6 via the public communication path is not specifically described in the embodiment, the communication between the transceivers 4 to 6 via the public communication path may be performed in the embodiment.
[0109] While the case where the public communication unit 35 is a Very High Frequency (VHF) communication device, an Ultra High Frequency (UHF) communication device, or the like is described in the embodiment, the embodiment is not limited thereto. For example, the public communication unit 35 may be a Free Space Optics (FSO) device, a Visible Light Communication (VLC) device, or the like.
[0110] While the case where the monitoring unit 36 is a monitoring camera or the like is described in the embodiment, the embodiment is not limited thereto. For example, the monitoring unit 36 may be a device for monitoring the peripheral area by a radar or a lidar.
[0111] The secret key sharing system 1 according to the embodiment is assumed to be, for example, used in an area where the infrastructure is not organized, used in a production system in a plant including an illumination, a robot, and a sensor, and used in rescue by a rescue team.
DESCRIPTION OF REFERENCE SIGNS
[0112] 1: Secret key sharing system [0113] 2, 4, 5, 6, 9, 10, 11, 14, 15, 16, 19, 20, 21, 30, 40, 42, 43, 44: Transceiver [0114] 31: Random number generation unit [0115] 32: Modulation unit [0116] 33: Demodulation unit [0117] 34: Directional carrier wave communication unit [0118] 35: Public communication unit [0119] 36: Monitoring unit [0120] 37: Information processing unit