{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T11:41:35Z","timestamp":1761824495268,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T00:00:00Z","timestamp":1719792000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Key R&D Program of China","award":["2020YFB1807502"],"award-info":[{"award-number":["2020YFB1807502"]}]},{"name":"CAS Project for Young Scientists in Basic Research","award":["YSBR-035"],"award-info":[{"award-number":["YSBR-035"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7]]},"DOI":"10.1145\/3634737.3656284","type":"proceedings-article","created":{"date-parts":[[2024,6,28]],"date-time":"2024-06-28T11:51:38Z","timestamp":1719575498000},"page":"353-365","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Physical-Layer Public Key Encryption Through Massive MIMO"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7928-3645","authenticated-orcid":false,"given":"Senlin","family":"Liu","sequence":"first","affiliation":[{"name":"State Key Laboratory of Information Security, Institute of Information Engineering, CAS, BeiJing, China"},{"name":"School of Cyber Security, University of Chinese Academy of Sciences, BeiJing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-4827-9236","authenticated-orcid":false,"given":"Tong","family":"Gao","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Information Security, Institute of Information Engineering, CAS, BeiJing, China"},{"name":"School of Cyber Security, University of Chinese Academy of Sciences, BeiJing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-5887-2392","authenticated-orcid":false,"given":"Yijian","family":"Liu","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Information Security, Institute of Information Engineering, CAS, BeiJing, China"},{"name":"School of Cyber Security, University of Chinese Academy of Sciences, BeiJing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7091-5810","authenticated-orcid":false,"given":"Xianhui","family":"Lu","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Information Security, Institute of Information Engineering, CAS, Beijing, China"},{"name":"School of Cyber Security, University of Chinese Academy of Sciences, BeiJing, China"}]}],"member":"320","published-online":{"date-parts":[[2024,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01457454"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/HORA55278.2022.9799887"},{"key":"e_1_3_2_1_3_1","unstructured":"Martin Albrecht and L\u00e9o Ducas. 2021. Lattice Attacks on NTRU and LWE: A History of Refinements. Cryptology ePrint Archive Paper 2021\/799. https:\/\/eprint.iacr.org\/2021\/799 https:\/\/eprint.iacr.org\/2021\/799."},{"key":"e_1_3_2_1_4_1","unstructured":"Joel Alwen and Chris Peikert. 2008. Generating Shorter Bases for Hard Random Lattices. Cryptology ePrint Archive Paper 2008\/521. https:\/\/eprint.iacr.org\/2008\/521 https:\/\/eprint.iacr.org\/2008\/521."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2899007.2899011"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2633387"},{"key":"e_1_3_2_1_7_1","volume-title":"Information Security and Cryptology - ICISC","author":"Cheon Jung Hee","year":"2016","unstructured":"Jung Hee Cheon, Kyoohyung Han, Jinsu Kim, Changmin Lee, and Yongha Son. 2017. A Practical Post-Quantum Public-Key Cryptosystem Based on spLWE. In Information Security and Cryptology - ICISC 2016, Seokhie Hong and Jong Hwan Park (Eds.). Springer International Publishing, Cham, 51--74."},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the 2nd Workshop on Communication Security, Marco Baldi, Elizabeth A. Quaglia, and Stefano Tomasin (Eds.). Springer International Publishing, Cham, 65--77","author":"Dean Thomas","year":"2018","unstructured":"Thomas Dean and Andrea Goldsmith. 2018. A CCA-Secure Cryptosystem Using Massive MIMO Channels. In Proceedings of the 2nd Workshop on Communication Security, Marco Baldi, Elizabeth A. Quaglia, and Stefano Tomasin (Eds.). Springer International Publishing, Cham, 65--77."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2017.2715187"},{"key":"e_1_3_2_1_10_1","volume-title":"Hawk: Module LIP Makes Lattice Signatures Fast, Compact and Simple. In Advances in Cryptology - ASIACRYPT","author":"Ducas L\u00e9o","year":"2022","unstructured":"L\u00e9o Ducas, Eamonn W. Postlethwaite, Ludo N. Pulles, and Wessel van Woerden. 2022. Hawk: Module LIP Makes Lattice Signatures Fast, Compact and Simple. In Advances in Cryptology - ASIACRYPT 2022, Shweta Agrawal and Dongdai Lin (Eds.). Springer Nature Switzerland, Cham, 65--94."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2009.2016267"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.2929400"},{"volume-title":"Advances in Cryptology --- CRYPTO '97, Burton S","author":"Goldreich Oded","key":"e_1_3_2_1_13_1","unstructured":"Oded Goldreich, Shafi Goldwasser, and Shai Halevi. 1997. Public-key cryptosystems from lattice reduction problems. In Advances in Cryptology --- CRYPTO '97, Burton S. Kaliski (Ed.). Springer Berlin Heidelberg, Berlin, Heidelberg, 112--131."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2023.3254511"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2864542"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3149301"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2023.3267852"},{"key":"e_1_3_2_1_18_1","volume-title":"Topics in Cryptology - CT-RSA","author":"Laarhoven Thijs","year":"2021","unstructured":"Thijs Laarhoven and Michael Walter. 2021. Dual Lattice Attacks for Closest Vector Problems (with Preprocessing). In Topics in Cryptology - CT-RSA 2021, Kenneth G. Paterson (Ed.). Springer International Publishing, Cham, 478--502."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2014.2317671"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2017.2690420"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2010.092810.091092"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.14569\/ijacsa.2018.090354"},{"key":"e_1_3_2_1_23_1","first-page":"69","article-title":"A Review on Physical Layer Security Techniques for 5G Wireless Networks","volume":"041","author":"Xiao Ren","year":"2018","unstructured":"Ren Pin-yi and TANG Xiao. 2018. A Review on Physical Layer Security Techniques for 5G Wireless Networks. Journal of Beijing University of Posts And Telecom 041, 005 (2018), 69--77.","journal-title":"Journal of Beijing University of Posts And Telecom"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPAWC48557.2020.9154219"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.phycom.2022.101817"},{"key":"e_1_3_2_1_26_1","unstructured":"Amin Sakzad and Ron Steinfeld. 2020. Comments on \"Physical-layer cryptography through massive MIMO\". arXiv:2001.02632 [cs.IT]"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2018.2835406"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2022.3216636"}],"event":{"name":"ASIA CCS '24: 19th ACM Asia Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Singapore Singapore","acronym":"ASIA CCS '24"},"container-title":["Proceedings of the 19th ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3634737.3656284","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T23:44:07Z","timestamp":1750290247000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3634737.3656284"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7]]},"references-count":28,"alternative-id":["10.1145\/3634737.3656284","10.1145\/3634737"],"URL":"https:\/\/doi.org\/10.1145\/3634737.3656284","relation":{},"subject":[],"published":{"date-parts":[[2024,7]]},"assertion":[{"value":"2024-07-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}