{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T13:47:45Z","timestamp":1770040065426,"version":"3.49.0"},"reference-count":23,"publisher":"MDPI AG","issue":"7","license":[{"start":{"date-parts":[[2019,7,14]],"date-time":"2019-07-14T00:00:00Z","timestamp":1563062400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61801115"],"award-info":[{"award-number":["61801115"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61571110"],"award-info":[{"award-number":["61571110"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Entropy"],"abstract":"<jats:p>Physical layer key generation (PKG) has become a research focus as it solves the key distribution problem, which is difficult in traditional cryptographic mechanisms. Information reconciliation is a critical process in PKG to obtain symmetric keys. Various reconciliation schemes have been proposed, including the error detection protocol-based approach (EDPA) and error correction code-based approach (ECCA). Both EDPA and ECCA have advantages and drawbacks, regarding information leakage, interaction delay, and computation complexity. In this paper, we choose the BBBSS protocol from EDPA and BCH code from ECCA as a case study, analyzing their comprehensive efficiency performance versus pass number and bit disagreement ratio (BDR), respectively. Next, we integrate the strength of the two to design a new hybrid information reconciliation protocol (HIRP). The design of HIRP consists of three main phases, i.e., training, table lookup, and testing. To comprehensively evaluate the reconciliation schemes, we propose a novel efficiency metric to achieve a balance of corrected bits, information leakage, time delay, and computation time, which represents the effectively corrected bits per unit time. The simulation results show that our proposed method outperforms other reconciliation schemes to improve the comprehensive reconciliation efficiency. The average improvement in efficiency is 2.48 and 22.36 times over the BBBSS and BCH code, respectively, when the range of the BDR is from 0.5% to 11.5%. Compared to the BBBSS protocol and the BCH code, HIRP lies at a mid-level in terms of information leakage and computation time cost. Besides, with the lowest time delay cost, HIRP reaches the highest reconciliation efficiency.<\/jats:p>","DOI":"10.3390\/e21070688","type":"journal-article","created":{"date-parts":[[2019,7,15]],"date-time":"2019-07-15T04:55:27Z","timestamp":1563166527000},"page":"688","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":23,"title":["A Hybrid Information Reconciliation Method for Physical Layer Key Generation"],"prefix":"10.3390","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1145-1168","authenticated-orcid":false,"given":"Guyue","family":"Li","sequence":"first","affiliation":[{"name":"School of Cyber Science and Engineer, Southeast University, Nanjing 210096, China"}]},{"given":"Zheying","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineer, Southeast University, Nanjing 210096, China"}]},{"given":"Yi","family":"Yu","sequence":"additional","affiliation":[{"name":"Institut Sup\u00e9rieur d\u2019Electronique de Paris, 75006 Paris, France"},{"name":"Conservatoire National des Arts et M\u00e9tiers, 75003 Paris, France"}]},{"given":"Aiqun","family":"Hu","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineer, Southeast University, Nanjing 210096, China"}]}],"member":"1968","published-online":{"date-parts":[[2019,7,14]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1109\/MCOM.2015.7120014","article-title":"Physical layer key generation in wireless networks: Challenges and opportunities","volume":"53","author":"Kai","year":"2015","journal-title":"IEEE Commun. Mag."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Li, G., Sun, C., Zhang, J., Jorswieck, E., Xiao, B., and Hu, A. (2019). Physical Layer Key Generation in 5G and Beyond Wireless Communications: Challenges and Opportunities. Entropy, 21.","DOI":"10.3390\/e21050497"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Mathur, S., Trappe, W., Mandayam, N., Ye, C., and Reznik, A. (2008, January 14\u201319). Radio-telepathy: Extracting a secret key from an unauthenticated wireless channel. Proceedings of the 14th ACM International Conference on Mobile Computing and Networking, San Francisco, CA, USA.","DOI":"10.1145\/1409944.1409960"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Jana, S., Premnath, S.N., Clark, M., Kasera, S.K., Patwari, N., and Krishnamurthy, S.V. (2009, January 20\u201325). On the effectiveness of secret key extraction from wireless signal strength in real environments. Proceedings of the 15th Annual International Conference on Mobile Computing and Networking, Beijing, China.","DOI":"10.1145\/1614320.1614356"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Zhang, J., Woods, R., Duong, T.Q., Marshall, A., and Ding, Y. (2016, January 3\u20136). Experimental Study on Channel Reciprocity in Wireless Key Generation. Proceedings of the 2016 IEEE 17th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Edinburgh, UK.","DOI":"10.1109\/SPAWC.2016.7536825"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1016\/j.comnet.2016.06.014","article-title":"Information reconciliation schemes in physical-layer security: A survey","volume":"109","author":"Huth","year":"2016","journal-title":"Comput. Netw."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/BF00191318","article-title":"Experimental quantum cryptography","volume":"5","author":"Bennett","year":"1992","journal-title":"J. Cryptol."},{"key":"ref_8","first-page":"410","article-title":"Secret-Key Reconciliation by Public Discussion","volume":"Volume 765","author":"Brassard","year":"1993","journal-title":"Advances of Cryptology-Eurocrypt \u201993, Proceedings of the 1993 Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lofthus, Norway, 23\u201327 May 1993"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1103\/PhysRevA.67.052303","article-title":"Fast, efficient error reconciliation for quantum cryptography","volume":"67","author":"Buttler","year":"2003","journal-title":"Phys. Rev. A"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Gong, C.Q., Zhou, H.Y., and Feng, J.L. (2009, January 20\u201322). An Improvement of Protocol Binary in Reconciliation of Quantum Key Distribution. Proceedings of the 2009 International Conference on Management and Service Science, Wuhan, China.","DOI":"10.1109\/ICMSS.2009.5301371"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Gong, C.Q., Zhou, H.Y., and Feng, J.L. (2009, January 12\u201314). Research on Reconciliation Algorithm in Quantum Key Distribution. Proceedings of the 2009 Ninth International Conference on Hybrid Intelligent Systems, Shenyang, China.","DOI":"10.1109\/HIS.2009.102"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Toyran, M. (2016, January 16\u201319). More efficient implementations of CASCADE information reconciliation protocol. Proceedings of the 2016 24th Signal Processing and Communication Application Conference (SIU), Zonguldak, Turkey.","DOI":"10.1109\/SIU.2016.7495702"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1109\/CC.2014.6879004","article-title":"Performance of an Improved One-Way Error Reconciliation Protocol Based on Key Redistribution","volume":"11","author":"Zhao","year":"2014","journal-title":"China Commun."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"789","DOI":"10.1155\/WCN.2005.789","article-title":"Construction of Rate-Compatible LDPC Codes Utilizing Information Shortening and Parity Puncturing","volume":"2005","author":"Tian","year":"2005","journal-title":"Eurasip J. Wirel. Commun. Netw."},{"key":"ref_15","unstructured":"Niuniu, S., Shuilian, Z., Gang, X., and Wenbing, C. (2013, January 23\u201325). The information reconciliation protocol basing on error codes. Proceedings of the 2013 IEEE 4th International Conference on Software Engineering and Service Science, Beijing, China."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Treeviriyanupab, P., Sangwongngam, P., Sripimanwat, K., and Sangaroon, O. (2012, January 16\u201318). BCH-based Slepian-Wolf coding with feedback syndrome decoding for quantum key reconciliation. Proceedings of the 2012 9th International Conference on Electrical Engineering\/Electronics, Computer, Telecommunications and Information Technology, Phetchaburi, Thailand.","DOI":"10.1109\/ECTICon.2012.6254266"},{"key":"ref_17","unstructured":"Nguyen, K.C., Assche, G.V., and Cerf, N.J. (2004). Side-Information Coding with Turbo Codes and its Application to Quantum Key Distribution. arXiv."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Elkouss, D., Martinez, J., Lancho, D., and Martin, V. (2010, January 6\u20138). Rate compatible protocol for information reconciliation: An application to QKD. Proceedings of the 2010 IEEE Information Theory Workshop on Information Theory (ITW 2010, Cairo), Cairo, Egypt.","DOI":"10.1109\/ITWKSPS.2010.5503195"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Li, G., Hu, A., Zhang, J., and Xiao, B. (2017, January 4\u20138). Security Analysis of a Novel Artificial Randomness Approach for Fast Key Generation. Proceedings of the GLOBECOM 2017\u20132017 IEEE Global Communications Conference, Singapore.","DOI":"10.1109\/GLOCOM.2017.8254029"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"3022","DOI":"10.1109\/TCOMM.2018.2814607","article-title":"High-Agreement Uncorrelated Secret Key Generation Based on Principal Component Analysis Preprocessing","volume":"66","author":"Li","year":"2018","journal-title":"IEEE Trans. Commun."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Gopinath, S., Guillaume, R., Duplys, P., and Czylwik, A. (2014, January 8\u201312). Reciprocity enhancement and decorrelation schemes for PHY-based key generation. Proceedings of the 2014 IEEE Globecom Workshops (GC Wkshps), Austin, TX, USA.","DOI":"10.1109\/GLOCOMW.2014.7063624"},{"key":"ref_22","unstructured":"Wu, H.Y. (2001, January 6\u20139). On the complexity of turbo decoding algorithms. Proceedings of the EEE VTS 53rd Vehicular Technology Conference, Spring 2001. Proceedings (Cat. No.01CH37202), Rhodes, Greece."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1016\/j.tcs.2014.05.025","article-title":"Quantum cryptography: Public key distribution and coin tossing","volume":"560","author":"Bennett","year":"2014","journal-title":"Theor. Comput. Sci."}],"container-title":["Entropy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1099-4300\/21\/7\/688\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T13:05:34Z","timestamp":1760187934000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1099-4300\/21\/7\/688"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,14]]},"references-count":23,"journal-issue":{"issue":"7","published-online":{"date-parts":[[2019,7]]}},"alternative-id":["e21070688"],"URL":"https:\/\/doi.org\/10.3390\/e21070688","relation":{},"ISSN":["1099-4300"],"issn-type":[{"value":"1099-4300","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,7,14]]}}}