Privacy Amplification Strategies in Sequential Secret Key Distillation Protocols Based on Machine Learning

It is well known that Renyi’s entropy of order 2 determines the maximum possible length of the distilled secret keys in sequential secret key distillation protocols so that no information is leaked to the eavesdropper. There have been no attempts to estimate this key quantity based on information av...

Full description

Saved in:
Bibliographic Details
Published inSymmetry (Basel) Vol. 14; no. 10; p. 2028
Main Authors Radomirović, Jelica, Milosavljević, Milan, Kovačević, Branko, Jovanović, Miloš
Format Journal Article
LanguageEnglish
Published Basel MDPI AG 01.10.2022
Subjects
Online AccessGet full text

Cover

Loading…
Abstract It is well known that Renyi’s entropy of order 2 determines the maximum possible length of the distilled secret keys in sequential secret key distillation protocols so that no information is leaked to the eavesdropper. There have been no attempts to estimate this key quantity based on information available to the legitimate parties to this protocol in the literature. We propose a new machine learning system, which estimates the lower bound of conditional Renyi entropy with high accuracy, based on 13 characteristics locally measured on the side of legitimate participants. The system is based on a prediction intervals deep neural network, trained for a given source of common randomness. We experimentally evaluated this result for two different sources, namely 14 and 6-dimensional EEG signals, of 50 participants, with varying advantage distillation and information reconciliation strategies with and without additional lossless compression block. Across all proposed systems and analyzed sources on average, the best machine learning strategy, called the hybrid strategy, increases the quantity of generated keys 2.77 times compared to the classical strategy. By introducing the Huffman lossless coder before the PA block, the loss of potential source randomness was reduced from 68.48% to a negligible 0.75%, while the leakage rate per one bit remains in the order of magnitude 10−4.
AbstractList It is well known that Renyi’s entropy of order 2 determines the maximum possible length of the distilled secret keys in sequential secret key distillation protocols so that no information is leaked to the eavesdropper. There have been no attempts to estimate this key quantity based on information available to the legitimate parties to this protocol in the literature. We propose a new machine learning system, which estimates the lower bound of conditional Renyi entropy with high accuracy, based on 13 characteristics locally measured on the side of legitimate participants. The system is based on a prediction intervals deep neural network, trained for a given source of common randomness. We experimentally evaluated this result for two different sources, namely 14 and 6-dimensional EEG signals, of 50 participants, with varying advantage distillation and information reconciliation strategies with and without additional lossless compression block. Across all proposed systems and analyzed sources on average, the best machine learning strategy, called the hybrid strategy, increases the quantity of generated keys 2.77 times compared to the classical strategy. By introducing the Huffman lossless coder before the PA block, the loss of potential source randomness was reduced from 68.48% to a negligible 0.75%, while the leakage rate per one bit remains in the order of magnitude 10−4.
Author Milosavljević, Milan
Kovačević, Branko
Radomirović, Jelica
Jovanović, Miloš
Author_xml – sequence: 1
  givenname: Jelica
  orcidid: 0000-0003-4895-5730
  surname: Radomirović
  fullname: Radomirović, Jelica
– sequence: 2
  givenname: Milan
  surname: Milosavljević
  fullname: Milosavljević, Milan
– sequence: 3
  givenname: Branko
  surname: Kovačević
  fullname: Kovačević, Branko
– sequence: 4
  givenname: Miloš
  surname: Jovanović
  fullname: Jovanović, Miloš
BookMark eNpNUU1PwzAMjdCQGGMn_kAljmiQJmnTHsf4mhhiEnCO3CQdqbpmJBlS_z2BIjQf7GfLfs-yT9Gos51G6DzFV5SW-Nr325SlmGBSHKExwZzOirJkowN8gqbeNzhahjOW4zFq1s58geyT-XbXmtpICMZ2yWtwEPTGaJ-YmOnPve6CgTZC6XRInnSf3BofTNsOA2tng5W29ckNeK2SWHoG-WE6naw0uM50mzN0XEPr9fQvTtD7_d3b4nG2enlYLuarmaQ5CzPN85rnnBJVcc54XLumJVCV6RyXRDIMVQ2ca57SgivIJJOYpCzLFK_qNFd0gpYDr7LQiJ0zW3C9sGDEb8G6jQAXjGy1IAUreBRjBctZLXMAFZUVIayKXExGrouBa-dsvIEPorF718X1BeGkyKKjWey6HLqks947Xf-rplj8_EYc_IZ-A_yjgvc
CitedBy_id crossref_primary_10_3390_math11061524
Cites_doi 10.1109/ACCESS.2016.2521718
10.1002/j.1538-7305.1949.tb00928.x
10.1109/JRPROC.1952.273898
10.1145/73007.73009
10.1103/PhysRevA.67.052303
10.1016/0022-0000(79)90044-8
10.1109/ACCESS.2018.2871713
10.1109/GLOBECOM46510.2021.9685523
10.1109/COMST.2018.2812301
10.1137/0217014
10.1007/3-540-39799-X_37
10.1109/18.243431
10.1109/TIT.2003.809559
10.1109/GLOBECOM46510.2021.9685855
10.1109/TNN.2010.2096824
10.1002/sec.1192
10.1109/18.256484
10.1109/TIT.2004.838380
10.1109/18.476316
10.1109/TCOMM.2018.2814607
10.1145/3023954
10.1007/3-540-48969-X_10
10.1017/CBO9780511977985
10.37247/ETNI2ED.2.22.4
ContentType Journal Article
Copyright 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Copyright_xml – notice: 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
DBID AAYXX
CITATION
7SC
7SR
7U5
8BQ
8FD
8FE
8FG
ABJCF
ABUWG
AFKRA
AZQEC
BENPR
BGLVJ
CCPQU
DWQXO
H8D
HCIFZ
JG9
JQ2
L6V
L7M
L~C
L~D
M7S
PIMPY
PQEST
PQQKQ
PQUKI
PRINS
PTHSS
DOA
DOI 10.3390/sym14102028
DatabaseName CrossRef
Computer and Information Systems Abstracts
Engineered Materials Abstracts
Solid State and Superconductivity Abstracts
METADEX
Technology Research Database
ProQuest SciTech Collection
ProQuest Technology Collection
Materials Science & Engineering Collection
ProQuest Central (Alumni)
ProQuest Central
ProQuest Central Essentials
AUTh Library subscriptions: ProQuest Central
Technology Collection
ProQuest One Community College
ProQuest Central
Aerospace Database
SciTech Premium Collection
Materials Research Database
ProQuest Computer Science Collection
ProQuest Engineering Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
Engineering Database
Publicly Available Content Database
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Academic
ProQuest One Academic UKI Edition
ProQuest Central China
Engineering Collection
Directory of Open Access Journals
DatabaseTitle CrossRef
Publicly Available Content Database
Materials Research Database
Technology Collection
Technology Research Database
Computer and Information Systems Abstracts – Academic
ProQuest Central Essentials
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
ProQuest Central (Alumni Edition)
SciTech Premium Collection
ProQuest One Community College
ProQuest Central China
ProQuest Central
Aerospace Database
Engineered Materials Abstracts
ProQuest Engineering Collection
ProQuest Central Korea
Advanced Technologies Database with Aerospace
Engineering Collection
Engineering Database
ProQuest One Academic Eastern Edition
ProQuest Technology Collection
ProQuest SciTech Collection
METADEX
Computer and Information Systems Abstracts Professional
ProQuest One Academic UKI Edition
Materials Science & Engineering Collection
Solid State and Superconductivity Abstracts
ProQuest One Academic
DatabaseTitleList Publicly Available Content Database
CrossRef

Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: 8FG
  name: ProQuest Technology Collection
  url: https://search.proquest.com/technologycollection1
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Sciences (General)
EISSN 2073-8994
ExternalDocumentID oai_doaj_org_article_2848776748464fc6aad673d224bbf14c
10_3390_sym14102028
GroupedDBID 5VS
8FE
8FG
AADQD
AAYXX
ABDBF
ABJCF
ADBBV
AFKRA
AFZYC
ALMA_UNASSIGNED_HOLDINGS
BCNDV
BENPR
BGLVJ
CCPQU
CITATION
E3Z
ESX
GROUPED_DOAJ
GX1
HCIFZ
IAO
ITC
J9A
KQ8
L6V
M7S
MODMG
M~E
OK1
PIMPY
PROAC
PTHSS
RIG
TR2
TUS
7SC
7SR
7U5
8BQ
8FD
ABUWG
AZQEC
DWQXO
H8D
JG9
JQ2
L7M
L~C
L~D
PQEST
PQQKQ
PQUKI
PRINS
ID FETCH-LOGICAL-c364t-e76f76732db7747899f39a3d5e6092c40abfa77e71387da5c4c021455d7bf16d3
IEDL.DBID DOA
ISSN 2073-8994
IngestDate Thu Jul 04 21:08:39 EDT 2024
Thu Oct 10 16:00:40 EDT 2024
Wed Aug 07 14:08:34 EDT 2024
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 10
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c364t-e76f76732db7747899f39a3d5e6092c40abfa77e71387da5c4c021455d7bf16d3
ORCID 0000-0003-4895-5730
OpenAccessLink https://doaj.org/article/2848776748464fc6aad673d224bbf14c
PQID 2728527235
PQPubID 2032326
ParticipantIDs doaj_primary_oai_doaj_org_article_2848776748464fc6aad673d224bbf14c
proquest_journals_2728527235
crossref_primary_10_3390_sym14102028
PublicationCentury 2000
PublicationDate 2022-10-01
PublicationDateYYYYMMDD 2022-10-01
PublicationDate_xml – month: 10
  year: 2022
  text: 2022-10-01
  day: 01
PublicationDecade 2020
PublicationPlace Basel
PublicationPlace_xml – name: Basel
PublicationTitle Symmetry (Basel)
PublicationYear 2022
Publisher MDPI AG
Publisher_xml – name: MDPI AG
References Carter (ref_20) 1979; 18
Wang (ref_29) 2015; 8
Xu (ref_13) 2017; 13
Li (ref_14) 2018; 66
Zhang (ref_10) 2016; 4
Keren (ref_22) 2018; 6
ref_36
Bennett (ref_8) 1986; Volume 218
ref_35
ref_12
Bennett (ref_9) 1988; 17
ref_11
ref_32
ref_31
Wolf (ref_2) 1998; Volume 1561
ref_19
ref_17
Khosravi (ref_25) 2010; 22
ref_15
Csiszar (ref_5) 2004; 50
Brassard (ref_30) 1994; Volume 765
Huffman (ref_34) 1952; 40
Maurer (ref_18) 2003; 49
ref_24
ref_23
Maurer (ref_4) 1993; 39
ref_21
Shannon (ref_1) 1949; 28
ref_28
Bennett (ref_7) 1995; 41
ref_27
ref_26
Ahlswede (ref_3) 1993; 39
Wu (ref_16) 2018; 20
Buttler (ref_33) 2003; 67
ref_6
References_xml – volume: 4
  start-page: 614
  year: 2016
  ident: ref_10
  article-title: Key Generation from Wireless Channels: A Review
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2016.2521718
  contributor:
    fullname: Zhang
– ident: ref_28
– volume: 28
  start-page: 656
  year: 1949
  ident: ref_1
  article-title: Communication Theory of Secrecy Systems
  publication-title: Bell Syst. Tech. J.
  doi: 10.1002/j.1538-7305.1949.tb00928.x
  contributor:
    fullname: Shannon
– ident: ref_32
– volume: 40
  start-page: 1098
  year: 1952
  ident: ref_34
  article-title: A Method for the Construction of Minimum-Redundancy Codes
  publication-title: Proc. IRE
  doi: 10.1109/JRPROC.1952.273898
  contributor:
    fullname: Huffman
– ident: ref_11
  doi: 10.1145/73007.73009
– ident: ref_24
– volume: 67
  start-page: 052303
  year: 2003
  ident: ref_33
  article-title: Fast, efficient error reconciliation for quantum cryptography
  publication-title: Phys. Rev. A
  doi: 10.1103/PhysRevA.67.052303
  contributor:
    fullname: Buttler
– volume: 18
  start-page: 143
  year: 1979
  ident: ref_20
  article-title: Universal classes of hash functions
  publication-title: J. Comput. Syst. Sci.
  doi: 10.1016/0022-0000(79)90044-8
  contributor:
    fullname: Carter
– ident: ref_26
– volume: 6
  start-page: 54033
  year: 2018
  ident: ref_22
  article-title: Calibrated Prediction Intervals for Neural Network Regressors
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2018.2871713
  contributor:
    fullname: Keren
– ident: ref_12
  doi: 10.1109/GLOBECOM46510.2021.9685523
– volume: 20
  start-page: 2389
  year: 2018
  ident: ref_16
  article-title: Information and Communications Technologies for Sustainable Development Goals: State-of-the-Art, Needs and Perspectives
  publication-title: IEEE Commun. Surv. Tutor.
  doi: 10.1109/COMST.2018.2812301
  contributor:
    fullname: Wu
– volume: 17
  start-page: 210
  year: 1988
  ident: ref_9
  article-title: Privacy Amplification by Public Discussion
  publication-title: SIAM J. Comput.
  doi: 10.1137/0217014
  contributor:
    fullname: Bennett
– volume: Volume 218
  start-page: 468
  year: 1986
  ident: ref_8
  article-title: How to reduce your enemy’s information
  publication-title: Advances in Cryptology, Proceedings of Crypto ’85, Lecture Notes in Computer Science
  doi: 10.1007/3-540-39799-X_37
  contributor:
    fullname: Bennett
– volume: 39
  start-page: 1121
  year: 1993
  ident: ref_3
  article-title: Common randomness in information theory and cryptography, Part I: Secret sharing
  publication-title: IEEE Trans. Inf. Theory
  doi: 10.1109/18.243431
  contributor:
    fullname: Ahlswede
– ident: ref_35
– volume: 49
  start-page: 839
  year: 2003
  ident: ref_18
  article-title: Secret-key agreement over unauthenticated public channels—Part III. Privacy amplification
  publication-title: IEEE Trans. Inf. Theory
  doi: 10.1109/TIT.2003.809559
  contributor:
    fullname: Maurer
– ident: ref_23
– ident: ref_17
  doi: 10.1109/GLOBECOM46510.2021.9685855
– volume: 22
  start-page: 337
  year: 2010
  ident: ref_25
  article-title: Lower Upper Bound Estimation Method for Construction of Neural Network-Based Prediction Intervals
  publication-title: IEEE Trans. Neural Netw.
  doi: 10.1109/TNN.2010.2096824
  contributor:
    fullname: Khosravi
– ident: ref_31
– ident: ref_27
– volume: Volume 765
  start-page: 410
  year: 1994
  ident: ref_30
  article-title: Secret key reconciliation by public discussion
  publication-title: Advances in Cryptology—EUROCRYPT’93
  contributor:
    fullname: Brassard
– ident: ref_15
– volume: 8
  start-page: 2507
  year: 2015
  ident: ref_29
  article-title: Analysis of the information theoretically secret key agreement by public discussion
  publication-title: Secur. Commun. Netw.
  doi: 10.1002/sec.1192
  contributor:
    fullname: Wang
– volume: 39
  start-page: 733
  year: 1993
  ident: ref_4
  article-title: Secret key agreement by public discussion from common information
  publication-title: IEEE Trans. Inf. Theory
  doi: 10.1109/18.256484
  contributor:
    fullname: Maurer
– volume: 50
  start-page: 3047
  year: 2004
  ident: ref_5
  article-title: Secrecy Capacities for Multiple Terminals
  publication-title: IEEE Trans. Inf. Theory
  doi: 10.1109/TIT.2004.838380
  contributor:
    fullname: Csiszar
– ident: ref_36
– volume: 41
  start-page: 1915
  year: 1995
  ident: ref_7
  article-title: Generalized privacy amplification
  publication-title: IEEE Trans. Inf. Theory
  doi: 10.1109/18.476316
  contributor:
    fullname: Bennett
– volume: 66
  start-page: 3022
  year: 2018
  ident: ref_14
  article-title: High-Agreement Uncorrelated Secret Key Generation Based on Principal Component Analysis Preprocessing
  publication-title: IEEE Trans. Commun.
  doi: 10.1109/TCOMM.2018.2814607
  contributor:
    fullname: Li
– ident: ref_19
– volume: 13
  start-page: 1
  year: 2017
  ident: ref_13
  article-title: Gait-Key: A gait-based shared secret key generation protocol for wearable devices
  publication-title: ACM Trans. Sen. Netw.
  doi: 10.1145/3023954
  contributor:
    fullname: Xu
– volume: Volume 1561
  start-page: 217
  year: 1998
  ident: ref_2
  article-title: Unconditional Security in Cryptography
  publication-title: Lectures on Data Security: Modern Cryptology in Theory and Practice, Lecture Notes in Computer Science
  doi: 10.1007/3-540-48969-X_10
  contributor:
    fullname: Wolf
– ident: ref_21
  doi: 10.1017/CBO9780511977985
– ident: ref_6
  doi: 10.37247/ETNI2ED.2.22.4
SSID ssj0000505460
Score 2.3054318
Snippet It is well known that Renyi’s entropy of order 2 determines the maximum possible length of the distilled secret keys in sequential secret key distillation...
SourceID doaj
proquest
crossref
SourceType Open Website
Aggregation Database
StartPage 2028
SubjectTerms advantage distillation
Artificial neural networks
CASCADE
Communication
Design
Distillation
EEG
Electroencephalography
Entropy (Information theory)
information reconciliation
key distillation
Leaking of information
Lower bounds
Machine learning
Neural networks
Privacy
Randomness
Reconciliation
SummonAdditionalLinks – databaseName: AUTh Library subscriptions: ProQuest Central
  dbid: BENPR
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1LT8JAEN74uHgxPiOKZg8e9NAA7T7akwGFEA2EGEm4Ndt9EAxSpNWEf-_ssqDGxEvTbrdNO7uz89iZbxC6JokBJZmHgRI6BgNFqEAkjAZ1aoTRVGRG2XznXp91h-RxREfe4Vb4sMr1mugWapVL6yOvhTyMKRwiejd_D2zVKLu76ktobKPdsEHsNu1uq90fPG-8LLZOG2H1VWJeBPZ9rVi-2dBGsPnjX6LIIfb_WZCdlOkcoH2vHuLmajwP0ZaeHaFDz4AFvvEo0bfH6HWwmHwKucRNGxNuvOsNr9FmofMErlygNDDxFE5BPyzxk17iB8vX01UQHB4s8jKH2VDgFgg0haGp5wIsNfbYq-MTNOy0X-67gS-cEMiIkTLQnBnOeBSqjFt8_CQxUSIiRTWrJ6GEEcmM4FyDgRpzJagksu4QyxXPTIOp6BTtzPKZPkOYaJpoEG_wOLxJxJmmYKEwIUMlsjhiFXS9pmE6X-FjpGBXWFKnP0hdQS1L300XC2rtGvLFOPU8koKkjB24EOhExEgmhIKfUKBkZPBZRFZQdT06qee0Iv2eF-f_375Ae6FNXXCBeFW0Uy4-9CUoFGV25WfNFwHIzJA
  priority: 102
  providerName: ProQuest
Title Privacy Amplification Strategies in Sequential Secret Key Distillation Protocols Based on Machine Learning
URI https://www.proquest.com/docview/2728527235
https://doaj.org/article/2848776748464fc6aad673d224bbf14c
Volume 14
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV07T8MwELagLCyI8hCFUnnoAEPUNI7tZGyhD4FaVYhK3SLHD1RUWtQEpP57zk6KihhYWKLEch76zue7iz5_RqgZxgaSZB54SugIChShPBEz6vnUCKOpSI2y651HYzachg8zOtvZ6stywgp54AK4FkyfkVOcgUAZGsmEUIwTBZEnTU07lG72bdOdYqpQ9YZUhPnFgjwCdX0r27xZSiPU-tGPEOSU-n9NxC669I_RUZkW4k7xOVW0p5cnqFo6XoZvSnXo21P0OlnPP4Xc4I7lgpvylxveqsxC5zlcOYI0OO8CTiEvzPGj3uB768-LgvyGJ-tVvoJRkOEuBDKFoWnkiJUal5qrL2do2u893w29csMETxIW5p7mzABUJFApt7r4cWxILIiimvlxIMESqRGcayhMI64ElaH0nVK54oAlU-QcVZarpb5AONQ01hDW4HZ4kohSTaEyYUIGSqQRYTXU3GKYvBe6GAnUExbqZAfqGupafL-7WDFr1wAmTkoTJ3-ZuIbqW-skpYdlScCDiMKB0Mv_eMcVOgzswgZH06ujSr7-0NeQbuRpA-1H_UEDHXR748lTw40zOA5m7S-H3daN
link.rule.ids 315,786,790,870,2115,12792,21416,27955,27956,33406,33777,43633,43838,74390,74657
linkProvider Directory of Open Access Journals
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV3JTsMwELWgHOCCWEVZfegBDhEl3pITKkspSxEHkLhFjpeqqDTQBKT-PWPXLSAkLlHiOFYynvEsGb9BqEFTC0ayiCMtTQIOitSRTDmLmsxKa5jMrXb7nbv3vPNEb57Zcwi4lSGtcrom-oVaF8rFyI9jEScMDoSdvr1HrmqU-7saSmjMowVKOHF8nrSvZjEWV6WN8uZkWx4B7_64HL-6xEbw-JNfisjj9f9Zjr2Oaa-g5WAc4tZkNlfRnBmuodUgfiU-DBjRR-vo5WHU_5RqjFsuI9yGwBueYs1C5z5c-TRpEOEBnIJ1WOFbM8YXTqoHkxQ4_DAqqgJ4ocRnoM40hqauT680OCCv9jbQU_vy8bwThbIJkSKcVpER3AouSKxz4dDx09SSVBLNDG-msYL5yK0UwoB7mggtmaKq6fHKtcjtCddkE9WGxdBsIUwNSw0oN3gcRpJJbhj4J1yqWMs8IbyOGlMaZm8TdIwMvApH6uwHqevozNF31sVBWvuGYtTLgoRkoCcTDy0EFhG1ikup4SM0mBg5vBZVdbQ7nZ0syFmZfXPF9v-3D9Bi57F7l91d39_uoKXYbWLwKXm7qFaNPswemBZVvu_55wtD8c4X
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV3NT4MwFG_8SIwX42ecTu1hBz2QIdAWTmY6cTpndtDEGyn9WDQ6FNBk_72vXTc1Jl4ItIXAa1_fe-XX30OoFSUanGQWeJKrGAIULj2eUOL5RHOtCM-1NPudB3e09xDdPJJHh3-qHKxyNifaiVoWwqyRtwMWxAQOIWlrB4sYdtOzt3fPZJAyf1pdOo1FtGycbJPGIU6v5ustJmNbRP3pFr0Q6tvV5NWAHCH6j38ZJcvd_2dqtvYmXUdrzlHEnWnPbqAFNd5EG04VK3zs-KJPttDzsHz65GKCOwYdrt0iHJ7xzkLjJ7iykGlQ5xc4BU-xxn01wV2j4S9TOBwelkVdwLio8DmYNomhaGChlgo7FtbRNnpIL-8vep5LoeCJkEa1pxjVjLIwkDkzTPlJosOEh5Io6ieBgL7JNWdMQagaM8mJiIRvucsly_UpleEOWhoXY7WLcKRIosDQwe3wJB7nikCsQrkIJM_jkDZQaybD7G3KlJFBhGFEnf0QdQOdG_nOmxh6a1tQlKPMaUsGNjO2NEPgHUVaUM4lfIQEdyOH14pEAzVnvZM5nauy7xGy93_1EVqBoZPdXt_199FqYPYzWHReEy3V5Yc6AC-jzg_t8PkCutzSTA
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Privacy+Amplification+Strategies+in+Sequential+Secret+Key+Distillation+Protocols+Based+on+Machine+Learning&rft.jtitle=Symmetry+%28Basel%29&rft.au=Radomirovi%C4%87%2C+Jelica&rft.au=Milosavljevi%C4%87%2C+Milan&rft.au=Kova%C4%8Devi%C4%87%2C+Branko&rft.au=Jovanovi%C4%87%2C+Milo%C5%A1&rft.date=2022-10-01&rft.issn=2073-8994&rft.eissn=2073-8994&rft.volume=14&rft.issue=10&rft.spage=2028&rft_id=info:doi/10.3390%2Fsym14102028&rft.externalDBID=n%2Fa&rft.externalDocID=10_3390_sym14102028
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2073-8994&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2073-8994&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2073-8994&client=summon