{"id":"https://openalex.org/W4385800819","doi":"https://doi.org/10.1109/vtc2023-spring57618.2023.10200596","title":"Fuzzy Secret Key Generation based on Phase Extraction and Constellation Rotation","display_name":"Fuzzy Secret Key Generation based on Phase Extraction and Constellation Rotation","publication_year":2023,"publication_date":"2023-06-01","ids":{"openalex":"https://openalex.org/W4385800819","doi":"https://doi.org/10.1109/vtc2023-spring57618.2023.10200596"},"language":"en","primary_location":{"id":"doi:10.1109/vtc2023-spring57618.2023.10200596","is_oa":false,"landing_page_url":"https://doi.org/10.1109/vtc2023-spring57618.2023.10200596","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE 97th Vehicular Technology Conference (VTC2023-Spring)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5027685680","display_name":"Ning Shen","orcid":"https://orcid.org/0000-0001-5205-456X"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Ning Shen","raw_affiliation_strings":["Xi&#x2019;an Jiaotong University,School of Information and Communications Engineering,Xi&#x2019;an,China,710049","Shaanxi Smart Networks and Ubiquitous Access Research Center, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"Xi&#x2019;an Jiaotong University,School of Information and Communications Engineering,Xi&#x2019;an,China,710049","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"Shaanxi Smart Networks and Ubiquitous Access Research Center, Xi'an, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054096196","display_name":"Qinghe Du","orcid":"https://orcid.org/0000-0002-4992-9166"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qinghe Du","raw_affiliation_strings":["Xi&#x2019;an Jiaotong University,School of Information and Communications Engineering,Xi&#x2019;an,China,710049","Shaanxi Smart Networks and Ubiquitous Access Research Center, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"Xi&#x2019;an Jiaotong University,School of Information and Communications Engineering,Xi&#x2019;an,China,710049","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"Shaanxi Smart Networks and Ubiquitous Access Research Center, Xi'an, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100366022","display_name":"Lei Lu","orcid":"https://orcid.org/0000-0002-3520-1297"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lei Lu","raw_affiliation_strings":["Xi&#x2019;an Jiaotong University,School of Information and Communications Engineering,Xi&#x2019;an,China,710049","Shaanxi Smart Networks and Ubiquitous Access Research Center, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"Xi&#x2019;an Jiaotong University,School of Information and Communications Engineering,Xi&#x2019;an,China,710049","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"Shaanxi Smart Networks and Ubiquitous Access Research Center, Xi'an, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101233661","display_name":"Shijiao Zhao","orcid":null},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shijiao Zhao","raw_affiliation_strings":["Xi&#x2019;an Jiaotong University,School of Information and Communications Engineering,Xi&#x2019;an,China,710049","Shaanxi Smart Networks and Ubiquitous Access Research Center, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"Xi&#x2019;an Jiaotong University,School of Information and Communications Engineering,Xi&#x2019;an,China,710049","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"Shaanxi Smart Networks and Ubiquitous Access Research Center, Xi'an, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5027685680"],"corresponding_institution_ids":["https://openalex.org/I87445476"],"apc_list":null,"apc_paid":null,"fwci":0.1339,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.43280355,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9916999936103821,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7871526479721069},{"id":"https://openalex.org/keywords/key-generation","display_name":"Key generation","score":0.7825338244438171},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.7009879350662231},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5842387676239014},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5770490169525146},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.46582338213920593},{"id":"https://openalex.org/keywords/consistency","display_name":"Consistency (knowledge bases)","score":0.44799864292144775},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4397301971912384},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.4346110224723816},{"id":"https://openalex.org/keywords/physical-layer","display_name":"Physical layer","score":0.43148523569107056},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.33248502016067505},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.25569361448287964},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.14096495509147644},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.1278654932975769}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7871526479721069},{"id":"https://openalex.org/C163173736","wikidata":"https://www.wikidata.org/wiki/Q3308558","display_name":"Key generation","level":3,"score":0.7825338244438171},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.7009879350662231},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5842387676239014},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5770490169525146},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.46582338213920593},{"id":"https://openalex.org/C2776436953","wikidata":"https://www.wikidata.org/wiki/Q5163215","display_name":"Consistency (knowledge bases)","level":2,"score":0.44799864292144775},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4397301971912384},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.4346110224723816},{"id":"https://openalex.org/C19247436","wikidata":"https://www.wikidata.org/wiki/Q192727","display_name":"Physical layer","level":3,"score":0.43148523569107056},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.33248502016067505},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.25569361448287964},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.14096495509147644},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.1278654932975769},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/vtc2023-spring57618.2023.10200596","is_oa":false,"landing_page_url":"https://doi.org/10.1109/vtc2023-spring57618.2023.10200596","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE 97th Vehicular Technology Conference (VTC2023-Spring)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.46000000834465027,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320337504","display_name":"Research and Development","ror":"https://ror.org/027s68j25"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W2091729149","https://openalex.org/W2143894538","https://openalex.org/W2168797902","https://openalex.org/W2574296225","https://openalex.org/W2619678842","https://openalex.org/W2755486826","https://openalex.org/W2806393332","https://openalex.org/W2887346460","https://openalex.org/W2910221781","https://openalex.org/W2997006392","https://openalex.org/W3094342167","https://openalex.org/W3107309965","https://openalex.org/W3116440429","https://openalex.org/W3153262499","https://openalex.org/W3163423821","https://openalex.org/W4200141182"],"related_works":["https://openalex.org/W4320075926","https://openalex.org/W1919042217","https://openalex.org/W3205185567","https://openalex.org/W1983617143","https://openalex.org/W3209591750","https://openalex.org/W3080982036","https://openalex.org/W2995273700","https://openalex.org/W4401387566","https://openalex.org/W2903037621","https://openalex.org/W2981994442"],"abstract_inverted_index":{"Physical":[0],"layer":[1],"security":[2,44],"(PLS)":[3],"of":[4,14,18,39,71,83],"wireless":[5],"communications":[6],"is":[7,25,75],"becoming":[8],"increasingly":[9],"significant":[10],"with":[11],"the":[12,60,72,80,84,93,98,104,108,113,131],"advent":[13],"6G.":[15],"The":[16,86,125],"reconciliation":[17],"channel-based":[19],"secret":[20,51],"key":[21,31,40,52,94,105,134],"generation":[22,53],"(SKG)":[23],"methods":[24],"necessary":[26],"to":[27,63,78,91,96],"avoid":[28],"inconsistencies":[29],"after":[30,68],"generation,":[32],"resulting":[33],"in":[34],"increased":[35],"communication":[36],"overhead,":[37],"leakage":[38],"information,":[41],"and":[42,102,107,123],"reduced":[43],"performance.":[45],"This":[46],"paper":[47],"proposes":[48],"a":[49,65],"fuzzy":[50,69],"(FSKG)":[54],"method":[55],"that":[56,112,130],"does":[57],"not":[58],"require":[59],"legitimate":[61],"user":[62],"perform":[64],"consistency":[66],"check":[67],"extraction":[70],"phase,":[73],"which":[74],"used":[76],"directly":[77],"encrypt":[79],"constellation":[81],"rotation":[82],"key.":[85],"proposed":[87,114],"scheme":[88,116],"allows":[89],"users":[90],"code-decode":[92],"bits":[95],"reduce":[97],"transmission":[99],"error":[100],"probability":[101],"improve":[103],"consistency,":[106],"simulation":[109,126],"results":[110,127],"prove":[111],"FSKG":[115],"outperforms":[117],"traditional":[118],"SKG":[119],"schemes":[120],"like":[121],"CQA":[122],"CQG.":[124],"also":[128],"indicate":[129],"best":[132],"secure":[133],"rate":[135],"can":[136],"be":[137],"achieved":[138],"by":[139],"applying":[140],"PSK":[141],"modulation.":[142]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
