{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T02:26:29Z","timestamp":1760235989580,"version":"build-2065373602"},"reference-count":46,"publisher":"MDPI AG","issue":"10","license":[{"start":{"date-parts":[[2021,10,11]],"date-time":"2021-10-11T00:00:00Z","timestamp":1633910400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Entropy"],"abstract":"<jats:p>In this paper, we propose a new system for a sequential secret key agreement based on 6 performance metrics derived from asynchronously recorded EEG signals using an EMOTIV EPOC+ wireless EEG headset. Based on an extensive experiment in which 76 participants were engaged in one chosen mental task, the system was optimized and rigorously evaluated. The system was shown to reach a key agreement rate of 100%, a key extraction rate of 9%, with a leakage rate of 0.0003, and a mean block entropy per key bit of 0.9994. All generated keys passed the NIST randomness test. The system performance was almost independent of the EEG signals available to the eavesdropper who had full access to the public channel.<\/jats:p>","DOI":"10.3390\/e23101327","type":"journal-article","created":{"date-parts":[[2021,10,11]],"date-time":"2021-10-11T21:45:32Z","timestamp":1633988732000},"page":"1327","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Secret-Key Agreement by Asynchronous EEG over Authenticated Public Channels"],"prefix":"10.3390","volume":"23","author":[{"given":"Meiran","family":"Galis","sequence":"first","affiliation":[{"name":"Vlatacom Institute of High Technology, Milutina Milankovica 5, 11070 Belgrade, Serbia"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Milan","family":"Milosavljevi\u0107","sequence":"additional","affiliation":[{"name":"Vlatacom Institute of High Technology, Milutina Milankovica 5, 11070 Belgrade, Serbia"},{"name":"Technical Faculty, Singidunum University, Danijelova 32, 11000 Belgrade, Serbia"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Aleksandar","family":"Jevremovi\u0107","sequence":"additional","affiliation":[{"name":"Technical Faculty, Singidunum University, Danijelova 32, 11000 Belgrade, Serbia"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8195-8576","authenticated-orcid":false,"given":"Zoran","family":"Banjac","sequence":"additional","affiliation":[{"name":"Vlatacom Institute of High Technology, Milutina Milankovica 5, 11070 Belgrade, Serbia"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Aleksej","family":"Makarov","sequence":"additional","affiliation":[{"name":"Vlatacom Institute of High Technology, Milutina Milankovica 5, 11070 Belgrade, Serbia"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jelica","family":"Radomirovi\u0107","sequence":"additional","affiliation":[{"name":"Vlatacom Institute of High Technology, Milutina Milankovica 5, 11070 Belgrade, Serbia"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"1968","published-online":{"date-parts":[[2021,10,11]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","article-title":"Communication Theory of Secrecy Systems*","volume":"28","author":"Shannon","year":"1949","journal-title":"Bell Syst. Tech. J."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1007\/3-540-48969-X_10","article-title":"Unconditional Security in Cryptography","volume":"Volume 1561","author":"Wolf","year":"1998","journal-title":"Lectures on Data Security: Modern Cryptology in Theory and Practice, Lecture Notes in Computer Science"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"1121","DOI":"10.1109\/18.243431","article-title":"Common randomness in information theory and cryptography, Part I: Secret sharing","volume":"39","author":"Ahlswede","year":"1993","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"733","DOI":"10.1109\/18.256484","article-title":"Secret key agreement by public discussion from common information","volume":"39","author":"Maurer","year":"1993","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"3047","DOI":"10.1109\/TIT.2004.838380","article-title":"Secrecy Capacities for Multiple Terminals","volume":"50","author":"Csiszar","year":"2004","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_6","unstructured":"(2021, October 06). Emotiv|Brain Data Measuring Hardware and Software Solutions. Available online: http:\/\/emotiv.com."},{"key":"ref_7","unstructured":"(2021, October 06). The science|Emotiv. Available online: https:\/\/www.emotiv.com\/the-science\/."},{"key":"ref_8","unstructured":"Pourbemany, J., Zhu, Y., and Bettati, R. (2021). Survey of Wearable Devices Pairing Based on Biometric Signals. arXiv."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Bonci, A., Fiori, S., Higashi, H., Tanaka, T., and Verdini, F. (2021). An Introductory Tutorial on Brain\u2013Computer Interfaces and Their Applications. Electronics, 10.","DOI":"10.3390\/electronics10050560"},{"key":"ref_10","unstructured":"(2021, October 06). Wisconsin Card Sorting Test\u2013Wikipedia. Available online: https:\/\/en.wikipedia.org\/wiki\/Wisconsin_Card_Sorting_Test."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1080\/87565649409540580","article-title":"Executive function and the Wisconsin card sorting test: Relationship with behavioral ratings and cognitive ability","volume":"10","author":"Riccio","year":"1994","journal-title":"Dev. Neuropsychol."},{"key":"ref_12","unstructured":"Milosaljevi\u0107, M., Adamovi\u0107, S., Jevremovic, A., and Antonijevi\u0107, M. (2018, January 11\u201314). Secret key agreement by public discussion from EEG signals of participants. Proceedings of the 5th International Conference on Electrical, Electronic and Computing Engineering, IcETRAN, Pali\u0107, Serbia."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"1878","DOI":"10.1109\/TIT.2016.2523980","article-title":"Efficient Algorithms for the Data Exchange Problem","volume":"62","author":"Milosavljevic","year":"2016","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"1136","DOI":"10.1109\/TIT.2013.2290993","article-title":"Coded Cooperative Data Exchange in Multihop Networks","volume":"60","author":"Courtade","year":"2013","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_15","unstructured":"Jevremovic, A., Arsic, S., Antonijevic, M., Ioannou, A., and Garcia, N. (2018, January 21\u201323). Human-computer interaction monitoring and analytics platform \u2013 Wisconsin card sorting test application. Proceedings of the HealthyIoT 2018\u20145th EAI International Conference on IoT Technologies for HealthCare, Guimar\u00e3es, Portugal."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Benitez, D.S., Toscano, S., and Silva, A. (2016, January 27\u201329). On the use of the Emotiv EPOC neuroheadset as a low cost alternative for EEG signal acquisition. Proceedings of the IEEE Colombian Conference on Communications and Computing (COLCOM), Cartagena, Colombia.","DOI":"10.1109\/ColComCon.2016.7516380"},{"key":"ref_17","unstructured":"Everson, K.P. (2018). A Framework for Feedback Control of Stress Using Eeg and Audio. [Bachelor\u2019s Thesis, The Ohio State University]."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Bloch, M. (2011). Physical-Layer Security from Information Theory to Security Engineering, Cambridge University Press.","DOI":"10.1017\/CBO9780511977985"},{"key":"ref_19","unstructured":"Zhou, X., Song, L., and Zhang, Y. (2014). Physical Layer Security in Wireless Communications, CRC Press. [1st ed.]."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"614","DOI":"10.1109\/ACCESS.2016.2521718","article-title":"Key generation from wireless channels: A review","volume":"4","author":"Zhang","year":"2016","journal-title":"IEEE Access"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"1976","DOI":"10.1587\/transfun.E93.A.1976","article-title":"Secret Key Agreement from Correlated Gaussian Sources by Rate Limited Public Communication","volume":"E93-A","author":"Watanabe","year":"2010","journal-title":"IEICE Trans. Fundam. Electron. Commun. Comput. Sci."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1109\/TIFS.2011.2132130","article-title":"Secret Key Agreement from Vector Gaussian Sources by Rate Limited Public Communication","volume":"6","author":"Watanabe","year":"2011","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"1915","DOI":"10.1109\/18.476316","article-title":"Generalized privacy amplification","volume":"41","author":"Bennett","year":"1995","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"4941","DOI":"10.1109\/TIT.2014.2323246","article-title":"Separation of Reliability and Secrecy in Rate-Limited Secret-Key Generation","volume":"60","author":"Chou","year":"2014","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1002\/j.1538-7305.1948.tb01338.x","article-title":"A mathematical theory of communication","volume":"27","author":"Shannon","year":"1948","journal-title":"Bell Syst. Tech. J."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"240","DOI":"10.1109\/TIFS.2010.2043187","article-title":"Information-Theoretically Secret Key Generation for Fading Wireless Channels","volume":"5","author":"Ye","year":"2010","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_27","unstructured":"(2021, October 06). Mile\u0161eva Monastery\u2014Wikipedia. Available online: https:\/\/en.wikipdia.org\/wiki\/Mile%C5%A1eva_Monastery."},{"key":"ref_28","unstructured":"(2021, October 06). Sklearn.Cluster.Ward\u2014Scikit-learn 0.15-git Documentation. Available online: https:\/\/scikit-learn.org\/0.15\/modules\/generated\/sklearn.cluster.Ward.html."},{"key":"ref_29","unstructured":"(2021, October 06). Kerckhoffs\u2019s Principle\u2014Wikipedia. Available online: https:\/\/en.wikipedia.org\/wiki\/Kerckhoffs%27s_principle."},{"key":"ref_30","unstructured":"Gander, M.J., and Maurer, U. (1994, January 20\u201324). On the secret key rate of binary random variables. Proceedings of the 1994 International Symposium on Information Theory and Its applications, Sydney, Australia."},{"key":"ref_31","first-page":"5017","article-title":"A new bit pair iteration advantage distillation\/degeneration protocol in information the-oretically secret key agreement","volume":"10","author":"Wang","year":"2014","journal-title":"J. Comput. Inf. Syst."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"2507","DOI":"10.1002\/sec.1192","article-title":"Analysis of the information theoretically secret key agreement by public discussion","volume":"8","author":"Wang","year":"2015","journal-title":"Secur. Commun. Networks"},{"key":"ref_33","unstructured":"Elkouss, D., Leverrier, A., Alleaume, R., and Boutros, J.J. (July, January 28). Efficient reconciliation protocol for discrete-variable quantum key dis-tribution. Proceedings of the IEEE International Symposium on Information Theory, Seoul, Korea."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"410","DOI":"10.1007\/3-540-48285-7_35","article-title":"Secret key reconciliation by public discussion","volume":"Volume 765","author":"Brassard","year":"1994","journal-title":"Advances in Cryptology-EUROCRYPT\u201993, Lecture Notes in Computer Science"},{"key":"ref_35","unstructured":"Reis, A. (2019). Quantum Key Distribution Post Processing\u2014A Study on the Information Reconciliation Cascade Protocol. [Master\u2019s Thesis, Faculdade de Engenharia]."},{"key":"ref_36","unstructured":"(2021, October 06). brunorijsman\/cascade-python\u2014GitHub. Available online: https:\/\/github.com\/brunorijsman\/cascade-python."},{"key":"ref_37","unstructured":"Johnson, D.S. (1989, January 14\u201317). Pseudo-random Generation from one-way functions. Proceedings of the 21st Annual ACM Symposium on Theory of Computing, Seattle, WA, USA."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"471","DOI":"10.1109\/TIT.1973.1055037","article-title":"Noiseless Coding of Correlated Information Sources","volume":"19","author":"Slepian","year":"1973","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_39","unstructured":"NIST (2021, October 06). A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications, Available online: https:\/\/csrc.nist.gov\/publications\/detail\/sp\/800-22\/rev-1a\/final."},{"key":"ref_40","first-page":"1","article-title":"Combining Cryptography with EEG Biometrics","volume":"2018","year":"2018","journal-title":"Comput. Intell. Neurosci."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"936","DOI":"10.1016\/j.procs.2017.08.126","article-title":"On The Study of EEG-based Cryptographic Key Generation","volume":"112","author":"Nguyen","year":"2017","journal-title":"Procedia Comput. Sci."},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Xu, W., Revadigar, G., Luo, C., Bergmann, N., and Hu, W. (2016, January 11\u201314). Walkie-talkie: Motion-assisted automatic key generation for secure on-body device communication. Proceedings of the 2016 15th ACM\/IEEE International Conference on Information Processing in Sensor Networks (IPSN), Vienna, Austria.","DOI":"10.1109\/IPSN.2016.7460726"},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3023954","article-title":"Gait-key: A gait-based shared secret key generation protocol for wearable devices","volume":"13","author":"Xu","year":"2017","journal-title":"ACM Trans. Sens. Netw. (TOSN)"},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Guglielmi, A.V., Muraro, A., Cisotto, G., and Laurenti, N. (2021). Information theoretic key agreement protocol based on ECG signals. arXiv.","DOI":"10.1109\/GLOBECOM46510.2021.9685523"},{"key":"ref_45","unstructured":"Milosavljevi\u0107, M., Adamovi\u0107, S., and Jevremovi\u0107, A. (2019, January 3\u20136). Secret keys generation from mouse and eye tracking signals. Proceedings of the 6th International Conference on Electrical, Electronic and Computing Engineering\u2014IcETRAN 2019, Silver Lake, Serbia."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1049\/iet-bmt.2016.0061","article-title":"A Novel, fuzzy commitment scheme for generation of cryptographic keys based on iris biometrics","volume":"6","author":"Sarac","year":"2017","journal-title":"IET Biom."}],"container-title":["Entropy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1099-4300\/23\/10\/1327\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T07:11:49Z","timestamp":1760166709000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1099-4300\/23\/10\/1327"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,11]]},"references-count":46,"journal-issue":{"issue":"10","published-online":{"date-parts":[[2021,10]]}},"alternative-id":["e23101327"],"URL":"https:\/\/doi.org\/10.3390\/e23101327","relation":{},"ISSN":["1099-4300"],"issn-type":[{"type":"electronic","value":"1099-4300"}],"subject":[],"published":{"date-parts":[[2021,10,11]]}}}