{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,16]],"date-time":"2026-05-16T03:30:46Z","timestamp":1778902246261,"version":"3.51.4"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,12,27]],"date-time":"2023-12-27T00:00:00Z","timestamp":1703635200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,12,27]],"date-time":"2023-12-27T00:00:00Z","timestamp":1703635200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2024,1]]},"DOI":"10.1007\/s11432-022-3768-8","type":"journal-article","created":{"date-parts":[[2023,12,29]],"date-time":"2023-12-29T09:02:29Z","timestamp":1703840549000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Modulated symbol-based one-time pad secure transmission scheme using physical layer keys"],"prefix":"10.1007","volume":"67","author":[{"given":"Xiaoyan","family":"Hu","sequence":"first","affiliation":[]},{"given":"Zheng","family":"Wan","sequence":"additional","affiliation":[]},{"given":"Kaizhi","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Liang","family":"Jin","sequence":"additional","affiliation":[]},{"given":"Mengyao","family":"Yan","sequence":"additional","affiliation":[]},{"given":"Yajun","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Jinmei","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,12,27]]},"reference":[{"key":"3768_CR1","doi-asserted-by":"publisher","first-page":"182304","DOI":"10.1007\/s11432-021-3259-0","volume":"65","author":"L Lv","year":"2022","unstructured":"Lv L, Li Z, Ding H Y, et al. Secure coordinated direct and untrusted relay transmissions via interference engineering. Sci China Inf Sci, 2022, 65: 182304","journal-title":"Sci China Inf Sci"},{"key":"3768_CR2","unstructured":"Vernam G S. Secret signaling system. U.S. Patent 1310719, 1919"},{"key":"3768_CR3","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"C E Shannon","year":"1949","unstructured":"Shannon C E. Communication theory of secrecy systems. Bell Syst Technical J, 1949, 28: 656\u2013715","journal-title":"Bell Syst Technical J"},{"key":"3768_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/CC.2017.8246328","volume":"14","author":"L Sun","year":"2017","unstructured":"Sun L, Du Q. Physical layer security with its applications in 5G networks: a review. China Commun, 2017, 14: 1\u201314","journal-title":"China Commun"},{"key":"3768_CR5","doi-asserted-by":"publisher","first-page":"88","DOI":"10.23919\/JCC.2021.09.008","volume":"18","author":"L Jin","year":"2021","unstructured":"Jin L, Hu X, Lou Y, et al. Introduction to wireless endogenous security and safety: problems, attributes, structures and functions. China Commun, 2021, 18: 88\u201399","journal-title":"China Commun"},{"key":"3768_CR6","doi-asserted-by":"publisher","first-page":"192304","DOI":"10.1007\/s11432-021-3353-5","volume":"65","author":"S X Gong","year":"2022","unstructured":"Gong S X, Tao X F, Li N, et al. Secret key generation over a Nakagami-m fading channel with correlated eavesdropping channel. Sci China Inf Sci, 2022, 65: 192304","journal-title":"Sci China Inf Sci"},{"key":"3768_CR7","doi-asserted-by":"publisher","first-page":"324","DOI":"10.1049\/ell2.12123","volume":"57","author":"Z Wan","year":"2021","unstructured":"Wan Z, Huang K, Lou Y, et al. Channel covariance matrix based secret key generation for low-power terminals in frequency division duplex systems. Electron Lett, 2021, 57: 324\u2013327","journal-title":"Electron Lett"},{"key":"3768_CR8","doi-asserted-by":"publisher","first-page":"614","DOI":"10.1109\/ACCESS.2016.2521718","volume":"4","author":"J Zhang","year":"2016","unstructured":"Zhang J, Duong T Q, Marshall A, et al. Key generation from wireless channels: a review. IEEE Access, 2016, 4: 614\u2013626","journal-title":"IEEE Access"},{"key":"3768_CR9","doi-asserted-by":"publisher","first-page":"688","DOI":"10.3390\/e21070688","volume":"21","author":"G Li","year":"2019","unstructured":"Li G, Zhang Z, Yu Y, et al. A hybrid information reconciliation method for physical layer key generation. Entropy, 2019, 21: 688","journal-title":"Entropy"},{"key":"3768_CR10","doi-asserted-by":"crossref","unstructured":"Peng L, Li G, Zhang J, et al. Securing M2M transmissions using nonreconciled secret keys generated from wireless channels. In: Proceedings of IEEE Globecom Workshops (GC Wkshps), 2018. 1\u20136","DOI":"10.1109\/GLOCOMW.2018.8644401"},{"key":"3768_CR11","doi-asserted-by":"crossref","unstructured":"Wan Z, Huang K. Non-reconciliation secret keys based secure transmission scheme using polar codes. In: Proceedings of IEEE 5th International Conference on Computer and Communications (ICCC), 2019. 1499\u20131504","DOI":"10.1109\/ICCC47050.2019.9064302"},{"key":"3768_CR12","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1109\/JIOT.2020.3004451","volume":"8","author":"G Li","year":"2021","unstructured":"Li G, Zhang Z, Zhang J, et al. Encrypting wireless communications on the fly using one-time pad and key generation. IEEE Internet Things J, 2021, 8: 357\u2013369","journal-title":"IEEE Internet Things J"},{"key":"3768_CR13","doi-asserted-by":"publisher","unstructured":"Hu X, Jin L, Huang K, et al. A secure communication scheme based on equivalent interference channel assisted by physical layer secret keys. Secure Commun Networks, 2020. doi: https:\/\/doi.org\/10.1155\/2020\/8840645","DOI":"10.1155\/2020\/8840645"},{"key":"3768_CR14","doi-asserted-by":"publisher","first-page":"1167","DOI":"10.3390\/e24081167","volume":"24","author":"M Wang","year":"2022","unstructured":"Wang M, Huang K, Wan Z, et al. Non-reconciled physical-layer keys-assisted secure communication scheme based on channel correlation. Entropy, 2022, 24: 1167","journal-title":"Entropy"},{"key":"3768_CR15","doi-asserted-by":"publisher","first-page":"197644","DOI":"10.1109\/ACCESS.2020.3034633","volume":"8","author":"I Bang","year":"2020","unstructured":"Bang I, Kim T. Secure modulation based on constellation mapping obfuscation in OFDM based TDD systems. IEEE Access, 2020, 8: 197644\u2013197653","journal-title":"IEEE Access"},{"key":"3768_CR16","doi-asserted-by":"publisher","first-page":"3016","DOI":"10.1109\/ACCESS.2016.2580673","volume":"4","author":"B Chen","year":"2016","unstructured":"Chen B, Zhu C, Li W, et al. Original symbol phase rotated secure transmission against powerful massive MIMO eavesdropper. IEEE Access, 2016, 4: 3016\u20133025","journal-title":"IEEE Access"},{"key":"3768_CR17","doi-asserted-by":"publisher","first-page":"9931","DOI":"10.1109\/TVT.2017.2737885","volume":"66","author":"S Althunibat","year":"2017","unstructured":"Althunibat S, Sucasas V, Rodriguez J. A physical-layer security scheme by phase-based adaptive modulation. IEEE Trans Veh Technol, 2017, 66: 9931\u20139942","journal-title":"IEEE Trans Veh Technol"},{"key":"3768_CR18","doi-asserted-by":"publisher","first-page":"3383","DOI":"10.1049\/iet-com.2019.0031","volume":"13","author":"L D Loganathan","year":"2019","unstructured":"Loganathan L D, Rengaraj R, Konganathan G, et al. Physical layer security using an adaptive modulation scheme for improved confidentiality. IET Commun, 2019, 13: 3383\u20133390","journal-title":"IET Commun"},{"key":"3768_CR19","doi-asserted-by":"crossref","unstructured":"Bi S, Yuan X, Zhang Y J A. DFT-based physical layer encryption for achieving perfect secrecy. In: Proceedings of IEEE International Conference on Communications (ICC), 2013. 2211\u20132216","DOI":"10.1109\/ICC.2013.6654856"},{"key":"3768_CR20","doi-asserted-by":"publisher","first-page":"4105","DOI":"10.1109\/TVT.2020.2975303","volume":"69","author":"T Mao","year":"2020","unstructured":"Mao T, Wang Q, Wen M, et al. Secure single-input-multiple-output media-based modulation. IEEE Trans Veh Technol, 2020, 69: 4105\u20134117","journal-title":"IEEE Trans Veh Technol"},{"key":"3768_CR21","doi-asserted-by":"crossref","unstructured":"Husain M I, Mahant S, Sridhar R. CD-PHY: physical layer security in wireless networks through constellation diversity. In: Proceedings of IEEE Military Communications Conference, 2012. 1\u20139","DOI":"10.1109\/MILCOM.2012.6415627"},{"key":"3768_CR22","doi-asserted-by":"crossref","unstructured":"Chorti A. Masked-OFDM: a physical layer encryption for future OFDM applications. In: Proceedings of IEEE Globecom Workshops, 2010. 1254\u20131258","DOI":"10.1109\/GLOCOMW.2010.5700138"},{"key":"3768_CR23","doi-asserted-by":"crossref","unstructured":"Xi C, Gao Y, Nan S, et al. Constellation symbol obfuscation design approach for physical layer security. In: Proceedings of the 10th International Conference on Communication Software and Networks (ICCSN), 2018. 264\u2013269","DOI":"10.1109\/ICCSN.2018.8488220"},{"key":"3768_CR24","doi-asserted-by":"publisher","first-page":"1328","DOI":"10.1109\/TCE.2010.5606266","volume":"56","author":"R Ma","year":"2010","unstructured":"Ma R, Dai L, Wang Z, et al. Secure communication in TDS-OFDM system using constellation rotation and noise insertion. IEEE Trans Consumer Electron, 2010, 56: 1328\u20131332","journal-title":"IEEE Trans Consumer Electron"},{"key":"3768_CR25","doi-asserted-by":"publisher","first-page":"1678","DOI":"10.1109\/TIFS.2015.2422264","volume":"10","author":"T Xiong","year":"2015","unstructured":"Xiong T, Lou W, Zhang J, et al. MIO: enhancing wireless communications security through physical layer multiple intersymbol obfuscation. IEEE Trans Inform Forensic Secur, 2015, 10: 1678\u20131691","journal-title":"IEEE Trans Inform Forensic Secur"},{"key":"3768_CR26","doi-asserted-by":"publisher","DOI":"10.1201\/b17668","volume-title":"Introduction to Modern Cryptography","author":"J Katz","year":"2014","unstructured":"Katz J, Lindell Y. Introduction to Modern Cryptography. 2nd ed. Boca Raton: Chapman and Hall\/CRC, 2014","edition":"2nd ed."},{"key":"3768_CR27","first-page":"283","volume":"15","author":"Z Szabo","year":"2014","unstructured":"Szabo Z. Information theoretical estimators toolbox. J Mach Learn Res, 2014, 15: 283\u2013287","journal-title":"J Mach Learn Res"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-022-3768-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11432-022-3768-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-022-3768-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,7]],"date-time":"2025-05-07T14:14:39Z","timestamp":1746627279000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11432-022-3768-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,27]]},"references-count":27,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,1]]}},"alternative-id":["3768"],"URL":"https:\/\/doi.org\/10.1007\/s11432-022-3768-8","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,12,27]]},"assertion":[{"value":"13 November 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 February 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 May 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 December 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"112303"}}