Two-layer tree-connected feed-forward neural network model for neural cryptography

Xinyu Lei, Xiaofeng Liao, Fei Chen, and Tingwen Huang
Phys. Rev. E 87, 032811 – Published 18 March 2013

Abstract

Neural synchronization by means of mutual learning provides an avenue to design public key exchange protocols, bringing about what is known as neural cryptography. Two identically structured neural networks learn from each other and reach full synchronization eventually. The full synchronization enables two networks to have the same weight, which can be used as a secret key for many subsequent cryptographic purposes. It is striking to observe that after the first decade of neural cryptography, the tree parity machine (TPM) network with hidden unit K=3 appears to be the sole network that is suitable for a neural protocol. No convincingly secure neural protocol is well designed by using other network structures despite considerable research efforts. With the goal of overcoming the limitations of a suitable network structure, in this paper we develop a two-layer tree-connected feed-forward neural network (TTFNN) model for a neural protocol. The TTFNN model captures the notion that two partners are capable of exchanging a vector with multiple bits in each time step. An in-depth study of the dynamic process of TTFNN-based protocols is then undertaken, based upon which a feasible condition is theoretically obtained to seek applicable protocols. Afterward, according to two analytically derived heuristic rules, a complete methodology for designing feasible TTFNN-based protocols is elaborated. A variety of feasible neural protocols are constructed, which exhibit the effectiveness and benefits of the proposed model. With another look from the perspective of application, TTFNN-based instances, which can outperform the conventional TPM-based protocol with respect to synchronization speed, are also experimentally confirmed.

  • Figure
  • Figure
  • Figure
  • Figure
  • Figure
  • Figure
  • Figure
  • Received 29 November 2012

DOI:https://doi.org/10.1103/PhysRevE.87.032811

©2013 American Physical Society

Authors & Affiliations

Xinyu Lei and Xiaofeng Liao*

  • College of Computer Science, Chongqing University, Chongqing 400044, People's Republic of China

Fei Chen

  • Department of Computer Science and Engineering, The Chinese University of Hong Kong, Hong Kong

Tingwen Huang

  • Texas A&M University at Qatar, Doha, P.O. Box 23874, Qatar

  • *xy-lei@qq.com, xfliao@cqu.edu.cn
  • chenfeiorange@163.com
  • tingwen.huang@qatar.tamu.edu

Article Text (Subscription Required)

Click to Expand

References (Subscription Required)

Click to Expand
Issue

Vol. 87, Iss. 3 — March 2013

Reuse & Permissions
Access Options
Author publication services for translation and copyediting assistance advertisement

Authorization Required


×
×

Images

×

Sign up to receive regular email alerts from Physical Review E

Log In

Cancel
×

Search


Article Lookup

Paste a citation or DOI

Enter a citation
×