{"id":"https://openalex.org/W4417284544","doi":"https://doi.org/10.1109/pimrc62392.2025.11274677","title":"Blockchain-Based Multi-Party Key Generation Using CSI: A Novel Hybrid Method","display_name":"Blockchain-Based Multi-Party Key Generation Using CSI: A Novel Hybrid Method","publication_year":2025,"publication_date":"2025-09-01","ids":{"openalex":"https://openalex.org/W4417284544","doi":"https://doi.org/10.1109/pimrc62392.2025.11274677"},"language":null,"primary_location":{"id":"doi:10.1109/pimrc62392.2025.11274677","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pimrc62392.2025.11274677","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE 36th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5025165774","display_name":"Mehmet Ali Ayg\u00fcl","orcid":"https://orcid.org/0000-0002-1797-8238"},"institutions":[{"id":"https://openalex.org/I48912391","display_name":"Istanbul Technical University","ror":"https://ror.org/059636586","country_code":"TR","type":"education","lineage":["https://openalex.org/I48912391"]}],"countries":["TR"],"is_corresponding":true,"raw_author_name":"Mehmet Ali Ayg\u00fcl","raw_affiliation_strings":["Istanbul Technical University,Department of Electronics and Communications Engineering,Istanbul,Turkey,34467"],"affiliations":[{"raw_affiliation_string":"Istanbul Technical University,Department of Electronics and Communications Engineering,Istanbul,Turkey,34467","institution_ids":["https://openalex.org/I48912391"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053539115","display_name":"Hakan Ali \u00c7\u0131rpan","orcid":"https://orcid.org/0000-0002-3591-6567"},"institutions":[{"id":"https://openalex.org/I48912391","display_name":"Istanbul Technical University","ror":"https://ror.org/059636586","country_code":"TR","type":"education","lineage":["https://openalex.org/I48912391"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"Hakan Ali \u00c7\u0131rpan","raw_affiliation_strings":["Istanbul Technical University,Department of Electronics and Communications Engineering,Istanbul,Turkey,34467"],"affiliations":[{"raw_affiliation_string":"Istanbul Technical University,Department of Electronics and Communications Engineering,Istanbul,Turkey,34467","institution_ids":["https://openalex.org/I48912391"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5042730077","display_name":"H\u00fcseyin Arslan","orcid":"https://orcid.org/0000-0001-9474-7372"},"institutions":[{"id":"https://openalex.org/I3125470973","display_name":"Istanbul Medipol University","ror":"https://ror.org/037jwzz50","country_code":"TR","type":"education","lineage":["https://openalex.org/I3125470973"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"H\u00fcseyin Arslan","raw_affiliation_strings":["Istanbul Medipol University,Department of Electrical and Electronics Engineering,Istanbul,Turkey,34810"],"affiliations":[{"raw_affiliation_string":"Istanbul Medipol University,Department of Electrical and Electronics Engineering,Istanbul,Turkey,34810","institution_ids":["https://openalex.org/I3125470973"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5025165774"],"corresponding_institution_ids":["https://openalex.org/I48912391"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.43146493,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9168999791145325,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9168999791145325,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.03660000115633011,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.00430000014603138,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/randomness","display_name":"Randomness","score":0.7597000002861023},{"id":"https://openalex.org/keywords/eavesdropping","display_name":"Eavesdropping","score":0.7368000149726868},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.7275000214576721},{"id":"https://openalex.org/keywords/key-generation","display_name":"Key generation","score":0.6547999978065491},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.48579999804496765},{"id":"https://openalex.org/keywords/commit","display_name":"Commit","score":0.46939998865127563},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.44589999318122864},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.41940000653266907}],"concepts":[{"id":"https://openalex.org/C125112378","wikidata":"https://www.wikidata.org/wiki/Q176640","display_name":"Randomness","level":2,"score":0.7597000002861023},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7473000288009644},{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.7368000149726868},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.7275000214576721},{"id":"https://openalex.org/C163173736","wikidata":"https://www.wikidata.org/wiki/Q3308558","display_name":"Key generation","level":3,"score":0.6547999978065491},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.48579999804496765},{"id":"https://openalex.org/C153180980","wikidata":"https://www.wikidata.org/wiki/Q19776675","display_name":"Commit","level":2,"score":0.46939998865127563},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.44670000672340393},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.44589999318122864},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.41940000653266907},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.38449999690055847},{"id":"https://openalex.org/C169903001","wikidata":"https://www.wikidata.org/wiki/Q3264987","display_name":"Reciprocity (cultural anthropology)","level":2,"score":0.3707999885082245},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3700000047683716},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.35260000824928284},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.3310999870300293},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.3276999890804291},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.29170000553131104},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.29120001196861267},{"id":"https://openalex.org/C168297262","wikidata":"https://www.wikidata.org/wiki/Q6031182","display_name":"Information protection policy","level":2,"score":0.2888999879360199},{"id":"https://openalex.org/C205533965","wikidata":"https://www.wikidata.org/wiki/Q1367345","display_name":"Key escrow","level":4,"score":0.28459998965263367},{"id":"https://openalex.org/C99674996","wikidata":"https://www.wikidata.org/wiki/Q1414155","display_name":"Key exchange","level":4,"score":0.2782999873161316},{"id":"https://openalex.org/C201866948","wikidata":"https://www.wikidata.org/wiki/Q228206","display_name":"Random number generation","level":2,"score":0.2554999887943268},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.25}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/pimrc62392.2025.11274677","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pimrc62392.2025.11274677","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE 36th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W1919042217","https://openalex.org/W1976947985","https://openalex.org/W2897450989","https://openalex.org/W2898104747","https://openalex.org/W2908737503","https://openalex.org/W2964113506","https://openalex.org/W3081904643","https://openalex.org/W3156129242","https://openalex.org/W4213413464","https://openalex.org/W4221147560","https://openalex.org/W4243494487","https://openalex.org/W4254197176","https://openalex.org/W4285597224","https://openalex.org/W4293231742","https://openalex.org/W4366374071","https://openalex.org/W4376137834","https://openalex.org/W4377708845","https://openalex.org/W4388933943","https://openalex.org/W4389382850","https://openalex.org/W4407690688"],"related_works":[],"abstract_inverted_index":{"This":[0],"paper":[1],"proposes":[2],"a":[3,94],"novel":[4],"multi-party":[5],"key":[6,45,53,89,137],"generation":[7,54],"method":[8,27,100,133,153],"that":[9,66,87],"jointly":[10],"utilizes":[11],"channel":[12],"state":[13],"information":[14],"(CSI)":[15],"and":[16,40,62,72,119,124,140,162],"blockchain":[17],"technology":[18,77],"to":[19,42,81],"enhance":[20],"security":[21],"in":[22,93,134],"distributed":[23],"systems.":[24],"The":[25,98],"proposed":[26,99,132,152],"starts":[28],"by":[29,150],"extracting":[30],"CSI":[31,107],"from":[32],"wireless":[33],"channels,":[34],"leveraging":[35],"the":[36,52,67,88,103,109,128,131,144,147,151,157],"channels\u2019":[37],"inherent":[38],"randomness":[39,145,164],"reciprocity":[41],"generate":[43],"secure":[44,71],"fragments":[46],"shared":[47],"among":[48],"legitimate":[49],"parties.":[50],"Then,":[51],"process":[55],"involves":[56],"several":[57],"stages,":[58],"including":[59],"quantization,":[60],"reconciliation,":[61],"privacy":[63],"amplification,":[64],"ensuring":[65,86],"resulting":[68],"keys":[69,149],"are":[70,91],"synchronized":[73],"across":[74],"participants.":[75],"Blockchain":[76],"is":[78,154],"then":[79],"leveraged":[80],"securely":[82],"commit":[83],"these":[84],"keys,":[85],"agreements":[90],"recorded":[92],"decentralized,":[95],"tamper-resistant":[96],"ledger.":[97],"effectively":[101],"combines":[102],"physical-layer":[104],"properties":[105],"of":[106,112,130,136,146,160],"with":[108],"decentralized":[110],"nature":[111],"blockchain,":[113],"providing":[114],"robust":[115],"protection":[116],"against":[117],"eavesdropping":[118],"tampering":[120],"attacks.":[121],"Theoretical":[122],"analyses":[123],"simulation":[125],"results":[126],"demonstrate":[127],"effectiveness":[129],"terms":[135],"mismatch":[138],"probability":[139],"secrecy":[141],"capacity.":[142],"Additionally,":[143],"generated":[148],"validated":[155],"using":[156],"National":[158],"Institute":[159],"Standards":[161],"Technology":[163],"tests.":[165]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-12-12T00:00:00"}
